Assess your current landscape. Know your weaknesses, where your data and assets are located, which protections you have in place, the effectiveness of your security solutions, and the readiness of your organization to defend.
Develop a plan. Marshall your resources to define a clear cyber security plan that includes policies and access levels, as well as what to do in the event of a breach. Identify the steps for containment and what it will take to address the incident and move forward.
Simplify security management. Consolidate functions, segments, and environments in one architecture. By doing this, you’re able to build successful operations and smooth coordination of policies across network segments.
Cover the basics. Apply patches and updates as soon as they become available.
Use the right technologies. Look for solutions that:
- Investigate any incoming file types Have the highest catch rate Identify zero-day threats within and beyond the operating system
- Include deep OS- and CPU-level sandbox capabilities to detect and block malware; and threat extraction to reconstruct incoming documents
- Deliver documents safely, without malware and without delay
- Are multilayered to automatically coordinate among different protections such as advanced threat prevention, security gateway, application control, antivirus, identity awareness, intrusion prevention, and URL filtering
Defend and train. The most successful cyber security strategies rely on five key protections:• Encryption—Make sure data is only visible to authorized individuals.
- Checks and Balances—Permissions are not one size fits all. Keep access to data limited to a need-to-know basis based on pre-set permissions.
- Education—Help employees understand risky behaviors; which information needs to be safeguarded; and how to avoid falling victim to spearphishing.
- Mobile Separation—Create a barrier between sensitive work and personal data. This makes it easier and quicker to manage your mobile cyber security than with multiple devices and policies.
- Training—Make sure your IT team is equipped to understand and recognize emerging trends in cyber crime. Provide drills and exercises to help staff think like hackers so they know how to react and respond during an attack.
Know how to respond. The more prepared your organization is for a cyber attack, the faster and less costly it will be to contain and clean up. Have a cyber security plan ready and if an attack occurs, assess the situation immediately. Take note of all of the details and share that information with all designated people in your overall security plan, including the board.