请登录后使用此功能。 您可以使用此功能将商品添加到您的收藏列表。
关闭
您已经添加该商品到您的收藏列表。 查看我的收藏
关闭
从您收藏列表中删除此商品。
关闭
请登录后使用此功能。 您可以使用此功能将公司添加到您的收藏夹列表。
关闭
这家公司已成功添加。 查看我的收藏
关闭
这家公司已从你的收藏夹列表中删除。
关闭
请登录后使用此功能。 您可以使用此功能将公司添加到您的询问车。
关闭
这家公司已被添加到您的询问车。
关闭
这家公司已从询价车中删除。
关闭
该商品已被添加到您的询问车。
关闭
该商品已经从您的询价车中删除。
关闭
商品/公司已达到添加至询价车的数量。
关闭
Fictron Industrial Supplies Sdn Bhd
Fictron Industrial Supplies Sdn Bhd 200601019263

How to Protect Your Business from Cyber Attacks

10-Oct-2019

How to guard your business from Cyber Attacks? Mitigating these threats takes above and beyond a single anti-virus upgrade; it involves ongoing vigilance. But shielding your systems doesn’t have to be complicated. Here is how to get started.
 
Limit Access to Your User Data & Information
 
Controlling having access to your valuable user data lessens the chance for human error, which is the number-one information security threat. If a worker leaves your company, or transfers to another company location, take protective action right away, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys. An ounce of access prevention can equal a pound of protection when it comes to limiting the impact of a disgruntled ex-employee.
 
Install Surge Protectors & Uninterruptible Power Supplies
 
Uninterruptible power supplies (UPS) can provide just enough battery life and time to save your data in the event of a power disruption. Check to make sure the UPS type and size meets your standards and requirements. Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Make sure to test and replace each UPS and surge protector as recommended by the manufacturer.
 
Patch Your Operating Systems & Software Regularly
 
Whatever new app can open the door to a cyber attack if you don’t on a regular basis patch and update all software on every device used by your employees. Regularly check for updates when purchasing a new computer or installing a new software system. Understand that software suppliers aren't required to provide security updates for unsupported products. For example, Microsoft® will stop supporting Windows 7 in January of 2020, so if you've not up-graded yet, now is the time. Do not holdup downloading operating system updates. Updates often include new or enhanced security features.
 
Install & Activate Software and Hardware Firewalls
 
Firewalls can combat malevolent hackers and hinder employees from browsing inappropriate websites. Install and update firewall systems on every employee computer, smartphone, and networked device. Include off-site employees, even in the event you use a cloud service provider (CSP) or a virtual private network (VPN). You may also want to install an intrusion detection/prevention system (IDPS) to provide a greater level of protection.
 
Secure All Wireless Access Points & Networks
 
For secure wireless networking, use these router best practices:
- Change the new device administrative password
- Set the wireless access point so that it does not broadcast its service set identifier (SSID)
- Set your router to use WiFi Protected Access 2 (WPA-2), with the Advanced Encryption Standard (AES) for encryption
- Avoid using WEP (Wired-Equivalent Privacy).
 
For guest WiFi access, use a separate network from your business account.
 
Set up Web & Email Filters
 
Use email and web browser filters to dissuade hackers and restrict spam from clogging employee inboxes. You can also download “blacklist” services to block users from browsing speculative websites that pose malware risks. Caution your employees against visiting sites that are frequently linked with cybersecurity threats, such as pornographic websites or social media. This might appear to be a no-brainer; but it only takes one employee to visit the wrong website to inadvertently download malware.
 
Use Encryption for Sensitive Business Information
 
Use full-disk encryption to shield all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a protected place distinct from your stored backups. Email recipients typically need the same encryption capability in order to decrypt. Never send the password or key in the same email as the encrypted document. Give it to them via phone or some other method.
 
Dispose of Old Computers & Media Safely
 
Before donating or trashing old computers, you must remove all important hard drive information. Remove any sensitive business or personal data on old CDs, flash drives, or other old media. Then destruct these items or take them to a company that will shred them for you. Destroy sensitive paper information with a crosscut shredder or an incinerator.
 
Train Your Employees
 
Cyber-vigilant employees are your best protection against information security threats.
 
Every employee should know:
- What business and personal use is permitted for emails
- How to treat business information at the office or at home
- What to do if a cybersecurity incident occurs
 
Train any new employee to protect valuable data and get them to sign your information policy. Use newsletters and/or ongoing training to boost your culture of cybersecurity. Now that we've covered the key steps to protect your valuable data and information, we will show you how to install mechanisms for detecting and recognizing a cyber attack in part three of our series on “Cybersecurity for Manufacturers” from the MEP National Network.
 
总办事处

Fictron Industrial Supplies Sdn Bhd 200601019263
No. 7 & 7A, Jalan Tiara, Tiara Square, Taman Perindustrian Sime UEP, 47600 Subang Jaya, Selangor, Malaysia.

电话:
传真:

邮件:
网址: http://www.fictron.biz
网址: https://fictron.newpages.com.my/
网址: https://fictron.n.my/
网址: http://fictron.newstore.my/

其他办事处

Fictron Industrial Automation Pte Ltd
140 Paya Lebar Road, #03-01, AZ @ Paya Lebar 409015, Singapore.

电话:
邮件:

游览 : 首页 - 分类 - 公司 - 地区 - 标签 - 商品 - 消息与促销 - 工作征聘 - 手机版 - 谷歌 - 搜索引擎优化结果

NEWPAGES

  • US 16792
  • GB 10809
  • CA 9818
  • AU 9618
  • IE 5934
  • BR 5444
  • NZ 4377
  • VN 1400
人 在线
Seni Jaya Logo
Brochure
Download
Our PackageContact Us