Five-point checkup to secure your systems!
The advent of the COVID-19 “coronavirus” has spooked worldwide markets and pushed an inconceivable number of professionals into their homes to work remotely. This introduces a nightmare for network security and the threat of disruption to business continuity. If you do not have a contingency plan in place or have been struggling to deploy a secure remote workforce effectively, please contact us. We are working extra hours through the pandemic to make sure businesses like yours remain safe and secure in this fast-moving situation.
Until we connect, here is a five-point checkup for the things that you should be doing immediately in this crisis!
1: Make staff aware of the huge uptick in phishing attacks. We wrote about this previously, but the cases continue to rise. Nobody from the CDC or “official” medical organizations are going to send around email attachments. With the fear of the unknown, and the lack familiarity with working from home, remote staff are being actively targeted by malicious actors. These remote workers urgently need to be made aware of the risks of these sorts of attacks.
2: Are your endpoints secure? Remote work has gone up exponentially in a very short period of time. That means there are certainly insecure laptops and other assets connecting to internal networking infrastructure in a way that could be leaking critical data to malicious actors. This needs to be resolved as quickly as possible, as it is a primary target for attackers.
3. What tripwires do you have in place? Are your systems up to date? Does every end point have updated malware protection? Have those things been tested recently? Sometimes the most important thing to do is make sure all events are monitored and logged! We can deploy best-in-class monitoring software quickly, and we would love to consult on setting up monitoring rules for your network.
4. Who gets alerted in the event of an attack or system failure? Malicious actors prey on the fact that most companies do not have a clear chain of command in place when a security breach occurs. If a breach occurs, it is crucial to identify and contain the threat to mitigate the impact of the breach. The same confusion occurs with the chain of command when critical IT systems fail. A good question to ask yourself is:
“In the event of a critical IT system failure, do I have sufficient IT redundancy measures in place?”
5. What happens if your head of IT gets sick? Do you have an IT managed service provider? One of the most crucial aspects of ensuring continuity of business is to have overlap in your IT, security and compliance staff. If the reports are true, the likelihood of your employees contracting COVID-19 is a very real concern that must have a plan in place. According to sources, companies in Paris with 250 employees have a 95% chance of having at least one employee infected with the coronavirus. The US has yet to see the same kind of outbreak, but the number of cases is accelerating quickly!
At GoVanguard, we are working extra hard during this global emergency created by the COVID-19 coronavirus pandemic to combat threat actors taking advantage of the situation. Please get in touch with us today to help build a robust business continuity plan and protect your organization.
Reach out to us today and see how easy it is to take control of your security and keep your data secure.