Protect your company with these cybersecurity keys

Alberto Blázquez 09/09/2021

    In 2008 Chinese hackers infiltrated the Obama and McCain campaigns stealing vast amounts of information. Cybersecurity also affects business so do not hesitate, protect your company with these keys that we are going to see here.

    Obama and Romney (2012) faced hacking attempts; And in 2016, cyber operatives stole and leaked thousands of emails and documents from Democratic campaign staff.

    More than three years ago, the Harvard Kennedy School, thanks to a team of experts in cybersecurity, politics and rights, developed a manual to try to minimize this type of attack. In The Cybersecurity Campaign Playbook appear issues as relevant as: the human element, internal communication, access and management of accounts, devices, networks, information operations and public communication or incident response planning.

     

    But what is cybersecurity?

     

    Protection of information assets (knowledge or data that have value for an organization), through the treatment of threats that put at risk the information that is processed, stored and transported by information systems (applications, services, information technology assets or other components that allow the management of it) that are interconnected.

    ISACA (Information Systems Audit and Control Association)

     

    Checklist: aspects you should check in terms of security

     

    According to the manual, mentioned above, there are five aspects that we should review immediately in our organizations, namely:

     

    1. Have we established a culture of safety awareness?

    Although we often throw balls out, our company is solely responsible for reducing risk and training staff to routinely update and patch systems.

    2. Use the cloud

    A cloud-based office suite will provide you with all basic office functions plus a safe place to store information.

    3. Use two-factor authentication and strong passwords

    In social networks, emails or storage of services you must require 2FA with mobile application or physical key for the second factor. When it comes to passwords, using an administrator is the most effective way to reduce risk.

    4. Use encrypted messages for conversations and sensitive material

    Using an encrypted messaging tool for messages and reserved documents makes it impossible for adversaries to obtain them, despite hacking your mobile email.

    5. Set up a plan

    In case at any time your security is compromised. You should know which expert company to contact and get technical help as quickly and efficiently as possible.

     

    How Microsoft 365 protects your business

     

     

    Person in background with icons representing aspects of cloud security

     

    The Microsoft 365 cloud allows any organization to increase its security as quickly and effectively as possible. The advantages in terms of protecting the identities of users, devices and the information it offers us are innumerable.

    The first steps that your company should take in terms of security and that Microsoft puts at your disposal are the following:

     

    – Set up multi-factor authentication

    When you make this change, they’ll be prompted to set up their phone for two-factor authentication the next time they sign in.

    – Train staff

    protect your business using strong passwords, shielding devices, enabling security in Windows 10 and Mac.

    – Use dedicated administrator accounts

    Administrators should have a separate user account for normal (non-administrative) use and use their administrative account only when necessary.

    – Increases the level of protection against malware in the mail

    Although Microsoft includes protection against malware, it is possible to increase this protection by blocking some type of attachments that are usually used to infect our computers.

    – Protect your company against ransomware

    creating mail flow rules that block file extensions commonly used for ransomware, or to warn users that they receive these attachments in email.

    – Stop automatic email forwarding

    Using another mail flow rule.

    – Use Office message encryption

    to send and receive encrypted emails inside and outside the organization.

    – Thanks to Microsoft Defender

    Safeguards email from targeted phishing attacks . Microsoft Defender also includes a Data Safe that protects your business from malicious and attachments. And a web safe against phishing attacks.

    , ,

    Go back