The document discusses common causes of security breaches and provides tips for individuals and businesses to better protect themselves from hackers. It notes that human error is responsible for the majority of security incidents and outlines strategies like using unique, changed passwords; enabling two-factor authentication; encrypting data; and updating devices regularly. The document advocates for a layered cybersecurity approach and summarizes best practices such as deploying anti-virus software, backups, and user education, and performing security risk assessments.
8. We’re at a tipping point.
In 2016, 2/3 of businesses surveyed experienced
an average of 5 security breaches.
And hackers compromised more than one
billion identities.
*Source: 2016 Forrester Research – North America
9. Make it tough on the hackers!
Follow these basic rules
to keep yourself safe!
10. Start with passwords
Use a unique password for
everything you access.
Change it frequently.
Consider using password
management software.
11. Make “2FA” your best friend
Use two-factor authentication where
possible.
This adds an extra layer of protection to
basic log-in procedures.
Often this is simply a text message to
your mobile phone.
12. This is especially important for industries with
strict regulatory compliance requirements.
Data protection software can provide
encryption of devices, email and data
itself (“at rest” and “in transit”)
Consider Data Encryption
13. They are essential to maintaining security.
Do not ignore those
frequent requests to
update your devices
with the latest
software!
14. • Open any email or attachments from an unknown sender
• Click an embedded link in a message without hovering your mouse over it to
check the URL (even if you think you know the sender)
• Respond to emails that request password changes or personal information
• Disable the auto lock feature or the password lock on your devices
• Leave devices unattended in a public place or in your car
• Use public Wi-Fi for business email or private transactions – it’s not secure!
NEVER DO THIS
21. Summary of Cybersecurity Best Practices
*It’s no longer considered a matter of if data loss will occur – it’s a matter of when.
Document your Security Policies
Use two-factor Authentication
Monitor your Network
Encrypt your DataDeploy Anti-spam & Anti-virus
*Deploy a Back Up and Recovery Solution
Update & Patch Regularly
Educate your Users
Deploy a Password Manager
Perform a Security Risk Assessment
22. Who We Are
www.ntiva.com
A Managed IT Services Company
Serving Metro DC
IT Consulting
IT Service & Support
Cloud Solutions
Cybersecurity
Learn more at www.ntiva.com