Cyber Best Practices for the New Year

As the holiday season comes to a close, the end of 2017 is quickly approaching. And if the past is any sign of the future, the coming New Year will bring with it a new set of cyber-attacks and cybersecurity challenges for businesses to face. While it’s impossible to know exactly what types of attacks will happen and when they will occur, organizations should start off 2018 on the right foot by being proactive with their cybersecurity practices. The below list is a great way to get going if your business uses the internet as part of your operations in any way.


Ransomware, phishing and other cyber-attacks can happen at any time, compromising your data security and your customers’ PII. This year we saw ransomware attacks like WannaCry and Petrwrap, multiple Wi-Fi protocol vulnerabilities and countless other attacks and threats. Having a complete, updated, and workable backup of your data will allow you to operate your business in the event it experiences an attack.


No matter how many security protocols and tools you may have in place, untrained employees pose a huge cybersecurity risk. Train and regularly reinforce proper procedures for storing and handling data as well as how to protect their accounts, identify phishing emails, steer clear of potentially dangerous applications and other important actions.


System and software updates are considered current for a limited amount of time. Update all operating systems, applications and software on a regular basis. The same goes for upgrading your firewall. Chances are your current tool won’t be enough for new and evolving attacks.


Make sure your business is compliant with important cyber regulations for HIPAA, PCI DSS, and ISO. If working through all of the regulations is out of your scope of resources, look toward a managed security service provider for assistance. Achieving compliance will help you structure your organization’s cybersecurity properly.


Take steps to secure your data by implementing layered access control. Assign data access permissions on a case by case basis that’s appropriate for each employee. Your employees should only be able to access the bare minimum of data they need to perform their job duties. Log all access activity and continuously monitor behaviors of all employees as well as any vendors or contractors.

Looking for more on how to set your business up for success in 2018? Dunbar Cybersecurity will show you how.

[inbound_button font_size=”15″ color=”#c8232b” text_color=”#ffffff” icon=”” url=”” width=”” target=”_blank”]Protect My Business[/inbound_button]