{"id":16409,"date":"2022-11-23T19:47:07","date_gmt":"2022-11-24T01:47:07","guid":{"rendered":"https:\/\/www.sfw.cpa\/news-and-guides\/?p=16409"},"modified":"2022-11-23T13:47:07","modified_gmt":"2022-11-23T19:47:07","slug":"reinforce-your-cybersecurity-defenses-regularly","status":"publish","type":"post","link":"https:\/\/www.sfw.cpa\/news-and-guides\/reinforce-your-cybersecurity-defenses-regularly\/","title":{"rendered":"Reinforce your cybersecurity defenses regularly"},"content":{"rendered":"<p><html><head><\/head><body><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/s3.amazonaws.com\/snd-store\/a\/79609628\/11_02_22_1354205086_bb_560x292.jpg\" \/><\/p>\n<p>If you\u2019ve been in business for any amount of time, you probably don\u2019t need anyone to tell you about the importance of cybersecurity. However, unlike the lock to a physical door, which generally lasts a good long time, measures you take to protect your company from hackers and malware need to be updated and reinforced much more regularly.<\/p>\n<p><strong>Two common categories<\/strong><\/p>\n<p>Most of today\u2019s business cyberattacks fall into two main categories: ransomware and social engineering.<\/p>\n<p>In a ransomware attack, hackers infiltrate a company\u2019s computer network, encrypt or freeze critical data, and hold that data hostage until their ransom demands are met. It\u2019s become a highly common form of cybercrime. Just one example, which occurred in October\u00a02022, involved a major health care system that had recently executed a major M&#038;A\u00a0deal.<\/p>\n<p>On the other hand, social engineering attacks use manipulation and pressure to trick employees into granting cybercriminals access to internal systems or bank accounts. The two most common forms of social engineering are phishing and business email compromise (BEC).<\/p>\n<p>In a typical phishing scam, cyberthieves send fake, but often real-looking, emails to employees to entice them into downloading attachments that contain malware. Or they try to get employees to click on links that automatically download the malware.<\/p>\n<p>In either case, once installed on an employee\u2019s computer, the malware can give hackers remote access to a company\u2019s computer network \u2014 including customer data and bank accounts. (Also beware of \u201csmishing,\u201d which is when fraudsters use text messages for the same purpose.)<\/p>\n<p>BEC attacks are similar. Here, cyberthieves send fake emails mainly to accounting employees saying the company\u2019s bank accounts have been frozen because of fraud. The emails instruct employees to reply with account usernames and passwords to supposedly resolve the problem. With this information, thieves can wreak financial havoc \u2014 including initiating unauthorized wire transfers \u2014 which can be difficult, if not impossible, to\u00a0reverse.<\/p>\n<p><strong>Preventative measures<\/strong><\/p>\n<p>Here are a few things you can do to guard against cyberattacks:<\/p>\n<p><strong>Continually train employees.<\/strong> Conduct mandatory training sessions at regular intervals to ensure your employees are familiar with your cybersecurity policies and can recognize the many possible forms of a cyberattack.<\/p>\n<p><strong>Maintain IT infrastructure.<\/strong> Instruct and remind employees to download software updates when they\u2019re available. Enforce a strict policy of regular password changes. If two-factor authentication is feasible, set it up. This is particularly important with remote employees.<\/p>\n<p><strong>Encrypt and back up data.<\/strong> All company data should be encrypted and regularly backed up on a separate off-site server. In the event of a ransomware attack, you\u2019ll still be able to access that data without paying the ransom.<\/p>\n<p><strong>Restrict access to your Wi-Fi network.<\/strong> First and foremost, it should be password-protected. Also, move your router to a secure location and install multiple firewalls. If you offer free Wi-Fi to customers, use a separate network for that purpose.<\/p>\n<p><strong>Consider insurance coverage.<\/strong> Insurers now sell policies that will help pay costs associated with data breaches while also covering some legal fees associated with cyberattacks. However, you\u2019ll need to shop carefully, set a reasonable budget and read the fine\u00a0print.<\/p>\n<p><strong>Defend your data<\/strong><\/p>\n<p>None of the measures mentioned above are one-time activities. On a regular basis, businesses need to determine what new training employees need and whether there are better ways to secure IT infrastructure and sensitive data. Let us help you assess, measure and track the costs associated with preserving your company\u2019s cybersecurity.<\/p>\n<p><em>\u00a9 2022<\/em><\/p>\n<p><\/body><br \/>\n<\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve been in business for any amount of time, you probably don\u2019t need anyone to tell you about the importance of cybersecurity. However, unlike the lock to a physical door, which generally lasts a good long time, measures you take to protect your company from hackers and malware need to be updated and reinforced [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,14,10],"tags":[8,11,12],"class_list":["post-16409","post","type-post","status-publish","format-standard","hentry","category-articles","category-business","category-news","tag-articles","tag-news","tag-updates"],"_links":{"self":[{"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/posts\/16409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/comments?post=16409"}],"version-history":[{"count":1,"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/posts\/16409\/revisions"}],"predecessor-version":[{"id":16410,"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/posts\/16409\/revisions\/16410"}],"wp:attachment":[{"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/media?parent=16409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/categories?post=16409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sfw.cpa\/news-and-guides\/wp-json\/wp\/v2\/tags?post=16409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}