dowhilesys “Empowering Small Medium Business in the Digital Era”
Cybersecurity Assessment 95% of security breaches are made by human error.
Can your team spot the red flags in a phishing email?
Phishing
The fraudulent practice of sending emails pretending to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Social Engineering
Is the art of manipulating people so they give up confidential information. When individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.
Passwords best practices
Never reveal your passwords to others
Use different passwords for different accounts and websites
Use Two-factor authentication
Use Length & complexity
Make passwords that are hard to guess but easy to remember
Use a password manager
Don’t write passwords in stickies
Cybersecurity Best Practices
Office
Computer
Physical security, access and locks to IT communication equipment (MDF and IDF)
Proper Firewall equipment and configurations
Content Filters and Traffic Shaping rules
Access Points (WIFI) with proper configuration and passphrase, avoid open WiFi
Backups
Guest WiFi for external users
User CyberSecurity Training
DNS (Umbrella) & SPAM (CPL) Protection is a plus
EDR (endpoint detection and response)
Windows firewall (OS)
Operating system security software
VPN client, recommended when not using a trusted network eg. traveling
Backups
DNS client is a plus
2 factor Authentication is a plus
We are here to help your business with our Cybersecurity trainings, recommendations and assessment of your business operations. Remember:
IT support is not just an option if you want your business to run smoothly, it's a necessity.
Interested, 15% off in your Cyber Security Assessment if you reach via this form!
(C) Dowhilesys - 2024
This website makes use of cookies. Please see our privacy policy for details. Accepting the use of cookies you agree to our Terms of use and privacy policy.