Identity and Access management

  • Multi-factor Authentication for all users.
  • Anti-spoofing settings enabled to prevent someone pretending they are the CEO.
  • Documented wire transfer process which includes verbal approval & security tokens.
  • Monthly detailed proactive review against best practices standards.
  • Conduct an audit of all technology solutions, user accounts and roles. Repeat this process on a quarterly basis.
  • Disable inactive or underutilized employee accounts if they are unused or inactive for long periods of time.
  • Use a password manager to create strong, unique password per technology solution and enable Multi-Factor Authentication (MFA) on the password manager. Do not allow storage of credentials in web browser.
  • Monitor accounts for exposed credentials using free or commercial tools.
  • Conduct phishing simulations and training for all staff.
  • Consider device trust or network IP whitelists for accessing technology portals and appliances.
  • Avoid shared accounts. MFA is designed for a single user. As a result, it is difficult to managed on shared accounts.
  • Protect any API keys in use:
    • Use different keys for different integrations rotating them periodically.
    • Use IP restrictions where possible.
    • Store keys securely.
    • Enable MFA on all accounts that are allowed to via API keys anywhere they are configured for use.


Protection of Local and Cloud Backups

  • Act on your vendor’s recommended guidance or best practices for the protection of your backup technology.
  • Move away from shared login accounts on appliances and technology portals.
  • Enable MFA on access to technology portals and appliances.
  • Store copies of backups offsite, or in an isolated network that is inaccessible from servers or workstations, thus making backups harder to access, encrypt, or destroy.
  • Monitor and alert for backup deletion. Some vendors offer “soft” delete so backups are not immediately removed. Understand your vendor’s capabilities.
  • Test your backups. Determine how long it takes to do a restore, and set accurate expectations should the need arise.


Cybersecurity Insurance

  • Invest in cybersecurity insurance.
  • Extortion coverage should cover your business into the low to mid-six figures.
  • Verify that there are no wartime exclusions with your carrier.
  • Verify that the insurance carrier will pay for a preferred incident response and forensics provider, or become comfortable with and accept the one the carrier offers.

Complete This Form
To Claim Your FREE
Cyber Security Assessment

Important! We hate spam as much (or more!) than you and promise to NEVER rent, share, or abuse your e-mail address and contact information in any way.