Cyber Security Services
Start Here — Your Business Security Basics
These security measures below are short and easy to understand. Remember they are step one! Then have a chat with 4Micro to learn about the next steps to take with further levels of cybersecurity maturity.
These business cybersecurity basic steps below are from The Australian Signals Directorate.
The ASD provides the authority and guidance to determine what security measures to do first (below), with the peace of mind you are addressing the prioritised security action items that matter most.
Steps to Protect Your Business
Summary - The Essential Eight Mitigation Strategies
- Patch applications
- Patch operating systems
- Multi-factor authentication
- Restrict administrative privileges
- Application control
- Restrict Microsoft Office macros
- User application hardening
- Regular backups
Do not underestimate these security tips - follow them and they'll have an outsized influence on saving your business from many attempts at cyber security compromises.
Minimum first steps to secure your business from cyber-threats
- Use multi-factor authentication (2-step verification) to add a second check for logging into your apps.
- Use a password manager. Start using passphrases at least 14 characters long.
- A passphrase is a stronger password that contains 4 or more random words that don't make sense together (not a sentence!).
- Avoid sharing logins. Talk to 4Micro about how.
- Reduce staff access to your apps and systems. Make your staff access policy needs based.
- Configure devices to auto-lock and keep the inactivity time-out short.
- Turn on auto-updates for your devices and computers apps and operating system.
- Backup your business information. A backup plan should cover all your data including email.
- Install and setup security software and setup scanning regularly.
- Work with 4Micro to secure your network. There are lots of entry points on your network to secure.
- Get an actual business firewall with cyber security capabilities. Don't rely on your ISP's supplied modem/router.
- Factory reset all devices and computers if selling or throwing out. Always use a certified E-waste disposal computer.
- Educate staff. Provide security awareness training
- Create an emergency plan for security incidents
Next steps after completing the above basic business security action items:
Seriously consider a structured approach to business cybersecurity "Maturity Level One" of the Essential Eight Program from cyber.gov.au