Noname
Noname
How to Conduct
It’s unlikely that you’ll be able to audit all your assets—so the final part of this
step is determining which assets you’ll audit and which you won’t.
Next, look at the assets you plan to audit and list the
potential threats next to each one.
and vice versa. Unless your organization prohibits an increasingly popular threat: ransomware. Any activity, occasion, behavior, or
BYOD, you should assume employees have thing that can cost your business a
access to company accounts on personal phones significant amount of money
and computers. Any device that has access to
your systems needs to be accounted for, even if
it’s not owned by your business.
Step 3 | Evaluate current security
It’s time for some honesty. Now that you have your list of
network and detecting threats, but it’s been a while since you had a
training for your employees. You’ll want to consider how you can build a
department.
S tep 4 | Assign risk scores
your team can use as many or as few factors as you deem necessary—and add weight Industry-level trends: What types of breaches are
to them accordingly. the most prevalent in your industry?
You can think of this as a to-do list for the coming weeks and months.
Employee education and awareness Email protection Password safety and access management
More than 80% of all hacking-related data Phishing attacks are increasingly popular Invest in a business password manager to help
breaches involve the use of stolen credentials or nowadays—and they are becoming more difficult eliminate password reuse, enhance password
passwords. Employees are the weakest link in to identify. Once clicked, a phishing email gives a complexity, and enable secure password
your network security—run training for new and perpetrator several options for gaining access to sharing. As the admin, you can easily manage
seasoned employees to create awareness your data via software installation. Consider and monitor employee access. If your company
around security best practices, like how to spot spam filters and visibly tagging emails as internal uses single sign-on (SSO) for certain key
a phishing email. or external to your network. accounts, you can integrate your password
secure access.
Consider network monitoring software to help Back up your data consistently to ensure that it’s To secure access points, it’s important for
alert you to any questionable activity or safe and separate in case of a malware attack or everyone on your network to have the latest
unknown access attempts. Software systems, a physical attack to your primary servers. software. You can enforce software updates
like Darktrace, offer 24/7 protection and use manually, or you can use a tool like Duo to keep
Check.
This should be used as a baseline for future