Gemini-Bimonthly-August - Flipbook - Page 13
Cybersecurity Best
Practices
TRAIN YOUR TEAM OFTEN
Your team is your first line of defense when it comes to
preventing cyber threats. It’s paramount to regularly
train your employees to recognize phishing emails,
suspicious links, and social engineering tactics. A single
click on a malicious file can compromise your network
for hours or days. Fortunately, there are many online
training tools and courses available to help reinforce
best practices. From interactive modules to phishing
simulations, there are multiple resources that make it
easier for you and your team to stay informed.
Fact:
According to Verizon’s DBIR, 81%
of hacking-related breaches involve
weak or stolen passwords.
USE STRONG PASSWORDS &
MULTI-FACTOR AUTHENTICATION
Tip:
Use a secure app that stores and
autofills your passwords, also called
a password manager, to store and
generate secure logins.
A simple step: enforce complex password requirements
and never reuse passwords across systems or platforms.
If possible, enable Multi-Factor Authentication. This adds
an extra layer of security to your accounts by notifying
devices that are already logged in that someone is
trying to log into that account. You can then let the
authenticator know if it was or wasn’t you.
SET PERMISSIONS FOR SENSITIVE
INFORMATION
While every team member plays an important role, not all
team members need access to every system or file. Most
software platforms allow you to set custom permissions
to ensure users only access the information relevant to
their responsibilities. Reducing the number of employees
with access to sensitive information like emails, phone
numbers, billing information, and mailing addresses
significantly reduces the chances of facing a cyber threat.
Consider assigning permissions based on roles to limit
unnecessary exposure and review every quarter.
Signage Spotlight
12