cybersecurity best practices blog hero

18 Cybersecurity Best Practices

Cybersecurity isn’t just about using antivirus software or downloading the latest and greatest firewall. Cybersecurity is the workings of several different efforts combined to ensure the security of your business and its assets. Below are some of the most important cybersecurity best practices that you should be implementing in your everyday business: 

1. Use Strong, Unique Passwords and Mandate Use of MFA

Strong passwords are crucial, but yours may not be as robust as you believe. Adding a couple numbers to the name of your first pet won’t take long for the hackers to crack. Try using passphrases that would be easy to remember but difficult to guess. Better yet, we recommend a password manager for generating strong, unique passwords and securely storing them in an encrypted vault.

To add an extra layer to the security of your credentials, we strongly recommend you enable multi-factor authentication (MFA) wherever possible.  

Password best practices

2. Backup Data

It’s critical to back up your data in case there is a situation where you lose your data such as in a ransomware attack. In a ransomware attack your data is stolen and encrypted and in some cases, you may never get it back. Storing copies of your data elsewhere, using hardware, software, or the cloud, minimizes the impact of data loss on your business.

3. Don’t Store Important Information in Unsecure Places

This may seem obvious, but many people aren’t sure what is or is not a secure place to store data. For example, you should not store confidential information on a device without firewall or antivirus and anti-malware software, nor should you store it under an account with weak login credentials. If you use tools like SharePoint or OneDrive then storing them here and sharing links to them is a much more secure method to store and share files. 

4. Keep Hardware and SoftwareUp-To-Date

Keeping hardware up to date not only keeps business processes running smoothly and quickly but it also ensures that the hardware is compatible with the latest security upgrades. Old, outdated computers may not be able to support new updates or higher end security software.  

 Your software also needs to be kept up to date. Software developers constantly search for bugs and vulnerabilities in their software. When they find these exploits, they send updates to users. Not updating your software right away leaves you vulnerable to hackers looking to crack down on these gaps in security 

Software updates - a cybersecurity best practice

5. Enable Firewall Protection at Work and at Home

Firewalls prevent the incoming of malicious or unnecessary traffic to your devices. Enabling firewalls on devices at home and work prevents outside access, significantly reducing the risk of unauthorized intrusion. It’s likely your networks at home don’t have near the amount of security in place as the networks at work therefore, you will need the extra protection while out of the office. 

6. Use Antivirus and Anti-Malware Software

Having antivirus or anti-malware software on your computer is like having a security guard standing at the door of your business. They stop suspicious traffic from entering your computer. These softwares are also able to detect and remove any viruses or malicious code found on your devices.  

Use anti-virus software

7. Monitor Privileged Users and Third Party Access

 Any kind of confidential data being accessed by users with privileged access should be monitored. By monitoring the data, you will be able to see where it has gone, who had access to it, and what kind of alterations (if any) had been done to the data. You should also be using the principle of least privilege in which users only have access to as little data as needed in order to sufficiently do their work. Access from third-party users to any kind of data in any case should also be closely monitored for the same security reasons.  

8. Protect Access From Remote Devices

Having employees work from home means that the attack surface will grow. Hackers are going after remote devices as they often contain gaps in security so it’s critical that you make sure these endpoints are secured. 

9. Ensure IoT Security

The internet of things encompasses devices that connect to the internet from anything like speakers to smart watches to security cameras. These devices typically lack in security so they require extra effort to ensure hackers can’t use them as a door to get around your firewalls and into your network.  

10. Avoid Opening Emails or Clicking on Links That Look Suspicious

Be wary of emails sent outside of your organization, especially ones that come from suspicious looking emails. If you are opening an email that seems out of the ordinary, avoid clicking on anything within the email as it could take you to a malicious site or download a malware-ridden file onto your device. Email is the number 1 attack vector for common threats like ransomware because it is relatively easy to trick people. Always be on high alert.

Check out this post for tips on how to tell if an email or text is a phishing scam: https://lighthouseintegrations.com/phishing-scams/

12. Check for HTTPS on Websites

When surfing the web, be sure to only visit websites that have “HTTPS” at the beginning of the URL. HTTPS is HTTP with encryption meaning that it is much more difficult to be intercepted by third-parties therefore, it is safer to use than websites with just HTTP. Most modern web browsers will alert you when you are trying to access an HTTP site but don’t count on this alone. 

13. Avoid Connecting to Public Wi-Fi

Public networks have weak security and are notoriously unsafe to connect to. Hackers target these networks because there are many different devices of varying security levels to crack into. If one device is infected, it’s likely the hackers will be able to gain access to a whole bunch of other devices connected to the same network including yours. If you do need to access a public network, make sure your firewall is turned on, your security software is up to date and use a VPN whenever possible. 

14. Training and Education

Cyber awareness training is one of the best things you can do to educate your employees on current cyber threats and how to protect themselves from cybercriminals. Cyber awareness training is something that should be done multiple times throughout the year as hacker tactics are frequently changing and it keeps cybersecurity at the forefront of employees’ thoughts and actions.

15. Promote a Security-First Work Culture

Similar to implementing cyber awareness training sessions, we also advise maintaining a security-first work culture and with this, people-centric security. People-centric security trusts employees to handle business safely and securely, emphasizing their responsibility in maintaining security. Fostering a security-first culture involves posters, discussions, and regular security reminder to promote awareness and cybersecurity best practices. Prioritizing security at work promotes safe online behaviour, emphasizing the user’s responsibility for the organization’s security 

16. Never Think You’re ‘Secure Enough’

There really is no such thing as being secure enough in today’s digital world so it’s time to lose that mentality. Any business no matter the size, big or small, is susceptible to being hacked. Just consider that even the largest companies like Volkswagen and Facebook, spending millions on cybersecurity, have experienced hacks. Small businesses may have a lower payout for the hackers but it takes less effort and is easy money. 

17. Invest in Security Upgrades

Many businesses, especially small businesses, are reluctant to invest in top of the line security – mainly because of the hefty price tag that often comes with it. Although security is quite an investment, it is certainly an investment worth making. It may seem unnecessary to you, but keeping your business out of the hands of the hackers means everything. Not only will a hack result in financial losses, but it can also lead to customer attrition, downtime, and potential legal consequences.  

18. Simplify Your Security Infrastructure

When done correctly, your security infrastructure should not be complicated. Just because you have hundreds of security tools in place doesn’t necessarily mean you’re that much more secure. Multiple tools often duplicate functions, causing unnecessary time and money expenditures in maintenance and operation. These tools also don’t always communicate with each other and can cause data jams or other inefficiencies.