RKL eSolutions Blog Trends and Insights

Protect Your Organization from Common Attacks by Implementing Good Cyber Hygiene

Cybersecurity is a major concern for any modern organization. With the rise of cyber threats, it is crucial to have a deep understanding and apply key cybersecurity concepts to protect against these threats. This post aims to provide you with insights on common cybersecurity attacks, good cyber hygiene, and effective strategies to protect your organization.

8 Common Cyber Attacks

Understanding the common types of cyber attacks can help you to better prepare and defend your organization. These include:

  1. Malware
  2. Ransomware
  3. Spoofing: A technique through which a cybercriminal disguises themselves as a known or trusted source
  4. Phishing: Emails that appear to be from trusted sources and attempt to elicit sensitive information
  5. Man-in-the-Middle: Stealing data by infiltrating communications between two parties
  6. Denial-of-Service (DoS): Flooding a network with fake requests to cause disruption in business operations
  7. Code Injection: An attacker injecting malicious code into a vulnerable computer or network to change its course of action
  8. Internet of Things (IoT): Assuming control of a device or network to steal data or create a botnet to launch DoS or DDoS attacks

Good Cyber Hygiene

Just like maintaining good personal hygiene is essential for your health, good cyber hygiene is crucial for the health of your organization. It includes practices like:

  • Regular updates for software and hardware
  • Strong password controls
  • Using encryption
  • Implementing mobile security
  • Safe data storage and access
  • Using a Virtual Private Network (VPN)
  • Installing antivirus and anti-malware software
  • Practicing safe web browsing
  • Setting up a secure Domain Name Service (DNS)

Password Controls and Management

Good cyber hygiene requires strong password controls. The average user has to remember between 3 to 19 passwords to log into over 170+ sites. Hence, using weak and shared passwords can lead to security issues. If one site is hacked, your password can be exposed on other sites. It's advisable to use a password manager to create and use truly random complex passwords.

Checking if your passwords have been compromised is also crucial. Websites like Password Strength Checker and Have I Been Pwned can help you check if your passwords have been compromised.

Impact on Organization: Defense-in-Depth

Implementing a defense-in-depth strategy can help protect your organization from multiple layers of cyber threats. This strategy includes:

  • Educating your employees to be part of the solution, not part of the problem
  • Integrating best practices that can be repeated to build security within the business
  • Implementing security solutions that can work with other components to optimize protection and productivity

Course of Action in Case of a Cyber Attack

It's crucial to have a plan of action in case a cyber attack occurs. This includes:

Internal and External Communication Plans

Having clear internal and external communication plans can help your organization respond effectively during a cyber attack. An internal communication plan should include regular training for employees on how to recognize phishing emails and other common attack methods. An external communication plan should outline how to communicate with customers and the public during a cyber attack. Remember, it's important to have these plans prepared in advance.

As the CFO of Brew, Drew Adamek puts it, “I prefer simple over complicated and, rather than thinking about a particular event, think about the impact.” It's important to think about the potential impact of a cyber attack on your organization and prepare accordingly.

Joe Noll

Written by Joe Noll

Joe is the President of the RKL eSolutions brand with a background in MCITP, MCTS Sage 500 ERP Certified Consultant Sage 500 ERP Certified Developer Sage ERP X3 Certified Developer Sage ERP X3 Technical Consultant Specialties: SQL Server Optimization assistance, Virtualization, Business Continuity Planning.