Mike HackmerMike Hackmer

  • Services
  • Podcasts and Webinars
  • Perspectives
  • Data and Trends
  • Blog
  • About
  • Contact

Cybersecurity: 8 Concrete Steps and Resources That Companies Can Use Now to Secure Their Networks

by Michael Hackmer / Monday, 18 July 2011 / Published in GovCon

Cybersecurity - A computer wrapped in chainsThere is no doubt that high-profile security breaches in the public and private sector shine a bright light on the importance of addressing network vulnerabilities. However, online and network security is not something just for government agencies, prime contractors and big, high-profile companies, but for smaller enterprises as well.

Why Would Anyone Hack MY Network?

The truth of the matter is – every company has customer lists, financial records and other data worth stealing. In addition, government contractors have been specifically targeted, starting with the largest contractors and moving down to smaller ones.

In fact, because you are a small to mid-sized business, you may be a more inviting target for skilled hackers and scam artists, who may see you as less-protected, or because you’re viewed as a stepping-stone to attacking another company or an agency customer.

Being prepared and well-informed is an essential best practice for every company, but especially so for government contractors.

Cybersecurity Tips for Government Contractors

Below is a list of tips (adapted from the FCC’s Ten Tips and other online resources), designed to help you better prepare a cybersecurity strategy to better insulate your business from cyberattack.

Train Your Employees and Communicate Often

Your company needs to outline a set of basic security practices and train employees about those policies and how they can best protect your company’s network. For example, according to a recent study commissioned by the Department of Homeland Security, 60% of contractor and agency staffers plugged unknown USB drives into their computers, potentially exposing them to malicious programs. (A study by a British secure USB stick manufacturer put it at 76%.) So develop a policy, train your workers and keep data management procedures fresh and top of mind throughout the year.

 

Use Strong Passwords and Change Them Regularly
As much as we want to use easy-to-remember passwords like a birthday, favorite pet or the street where we grew up, those items (as well as any words found in the dictionary) are the easiest passwords to hack. Tips for creating strong passwords include combining upper and lower-case letters, mixing in symbols and numbers, and formingpassphrases that you can memorize. Also, make sure you change your passwords at least every three months… and don’t use the same password for everything.

 

Scrutinize The Email You Receive BEFORE Opening
Be careful before you open any email, especially if it is unsolicited. (And especially if it’s before you’ve had your first cup of coffee.) Unsolicited or impersonated email can often be the way cybercriminals gain access to your networks. Remember not to download any files from unknown people or click on any links. The safest bet is to isolate the email and consult with your network administrator. Do not reply to and forward these kind of email messages.

 

Do Not Open or Share Files Over Instant Messenger
The rules here are similar for email. Though some companies have internal networks, never accept files unless you are expecting them or know who is sending the files.

 

Install Antivirus, Antispyware and Security Monitoring Programs on Your Computers
Antivirus and antispyware software are important first steps to protecting your computers. But there are other software tools that provide even higher levels of protection against online data theft. Conduct some online research and speak with vendors to determine how you can monitor your online network. By keeping an eye on your network’s activity, you can react faster to possible breaches in security and close off attacks before sensitive data is lost or stolen.

 

Make Sure Everyone Receives Operating Systems and Application Updates
All operating systems provide regular security updates and patches for errors. Application providers typically provide these as well, especially browsers. Make sure all the users in your network are receiving these updates. If necessary, set scheduled updates on a monthly basis to ensure everyone is running with the latest versions of key software.

 

Back Up Your Data
Schedule regular backups of your data. This can mean setting up a separate internal network drive available to employees or outsourcing this through a third-party vendor. Automatic updates are helpful to ensure that your key data across the company is backed-up properly. Some companies back up their data nightly, while others do it weekly. Depending on the sensitivity and/or importance of your data, choose the arrangement that works best for your business.

 

Limit Access to Your Network
It is important to keep access to your networks at a minimum. Do not allow unauthorized people to have access to your server room or vital systems. If you distribute laptops, make sure employees keep them secure. Unused laptops should be stored in a secure location. Also, make sure your WiFi network (if you have one) is not open for the general public. Lastly, you will want to limit employee access to data and information, and limit authority to install software to system administrators. This will reduce the likelihood of malicious software or illegal software being installed on your company’s property – thereby reducing downtime to a virus and/or legal liability.

 

 

Cybersecurity Articles and Resources

 

Protecting Your Small Business, Entrereneur Magazine

2011 Awards for best computer security tools, SC Magazine

Free training materials, security configuration guides from Internet Security Alliance

Symantec Security Solutions for Small Business

McAfee Security Solutions for Small Business

Microsoft Small Business Guide

Security Tips from Securing our eCity

Small Business Solutions form StopBadware

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Tweet
Tagged under: cybersecurity

About Michael Hackmer

Michael Hackmer is the founder of Social Web Tactics (www.socialwebtactics.com), a digital marketing and sales agency focused on providing businesses and organizations the ability to connect with their audience using the latest and most effective digital technologies and tools. He has been a speaker, consultant and marketing strategist for over 15 years. He also has worked in federal and state government relations, and managed industry affairs and association membership. He has developed digital and strategic marketing campaigns for companies including: Adobe, Deltek, HP, K12, Red Hat, Strayer University and more. He has helped non-profits and corporations with marketing automation solutions. He is originally born in Boston, MA. Graduated Phillips Academy, Andover in 1994. Received his B.A. in Politics from The Catholic University of America in 1998. Michael lives in Ashburn, Virginia with his wife and daughter. He loves to run, swim and travel throughout South America.

What you can read next

Stay Competitive, Hire Creative People – Part 2
Vivek Kundra - Official White House photo
Report: Vivek Kundra to Leave White House in August
Live Blog, Twitter Feed and Pictures – Gov 2.0 Summit – Washington, DC

Recent Posts

  • Quantum Leap Forward

    Multiplying Your Personal Effectiveness In Quantum Leaps

    You2 is a formula for dramatically improving on...
  • Healthy Living

    Healthy Living: Vitamin D can help reduce coronavirus risk by 54% according to Boston University doctor

    Vitamin D can help reduce coronavirus risk by 5...
  • How To Get Started Identifying Your Target Audience

    Who is going to buy from you? Or use your servi...
  • When Just the Facts Are What Is Missing

    When Just the Facts Are What Is Missing

    With growing bias and subjectivity in our news,...
  • Stay Home - Save Lives - AdobeStock_334374864 2000 x 500

    Being Pragmatic About COVID-19 At Work

    Warning: A proud Dad tells a story about his ol...

SERVICES

  • Strategy
  • Audiences
  • Experiences

PERSPECTIVES

  • Top Marketing and Communications Challenges
  • Ideas for Your Next Marketing or Communications Campaign
  • Business Trends for 2023
  • Government Trends for 2023

STATISTICS AND TRENDS

  • Latest Data (Home)
  • Business Trends
  • Cybersecurity

NETCASTS / PODCASTS

  • Netcasts, Podcasts and Webinars
  • OPTIMISTIC Talk
  • Webinar & Report: Top Communications and Marketing Challenges
  • Webinar & Report: Ideas for Your Next Marketing or Communications Campaign
  • Webinar: How To Use Search Engine Optimization To Create Effective Content
  • Webinar: How To Create A Successful Lead Generation Webinar
  • Webinar & Report: Business Trends for 2023
  • Webinar & Report: Government Trends for 2023

FOLLOW MIKE HACKMER

© 2022 Michael Hackmer LLC | All rights reserved. | Disclaimer, Terms and Conditions

Contact   571-271-5976
TOP
 

Loading Comments...
 

You must be logged in to post a comment.