Lesson 1, Topic 1
In Progress

Top Five Tips

Mel Dowdell February 26, 2022
Scan For Suspicious Emails

Invest in a strong antivirus software program and other security software that can flag suspicious emails. Also, make sure email addresses are spelled correctly or can be verified through alternative methods like a known good phone number.

Keep Employees Informed

Create a detailed cyber awareness program that’s specific to your company’s needs. You can start by using the Federal Communications Commission’s online cyberplanner tool. Then educate employees and regularly update them on cyber security best practices like changing passwords often and using secure and complex configurations.

Update Systems

Avoid clicking on links or attachments from untrusted sources because they may contain malware, which infects your device to capture personal and financial information. Update your company’s computer and security software systems regularly with the latest malware and virus protections. Also, encrypt mobile device data and make sure people with access to your records and finances use only company-approved devices.

Back Up Data

Back up data often, and consider storing your company data on multiple media types and at least one that’s off network. To keep that data protected, remember to secure and monitor your network to deter unauthorized access or theft.

Verify Invoices

Fake invoices

Similar to a business email compromise, an unknown company sends an invoice that appears to be for something critical or from a regular vendor. What’s really happening is the criminal hopes you’ll be too worried or busy and that you—or your employee—will pay the invoice immediately.

Verify invoices before paying

Don’t blindly pay the invoice. Take the time to verify that services or items were actually ordered and fulfilled by the billing company. Also, consider limiting the number of employees with access to records and finances as much as possible, as well as requiring multiple users to initiate and approve transactions.

Clean Desk Policy

Sensitive information on a desk such as sticky notes, papers and printouts can easily be taken by thieving hands and seen by prying eyes. According to the mandates of a clean desk policy, the only papers that should be left out are ones relevant to the current project you are working on. All sensitive and confidential information should be removed from the desk at the end of each working day. During lunch or any emergency departure during office time, all critical information should be placed in a locked desk drawer.

Beware Email Attachments

Look Out For Strange Emails

Don’t respond to emails that claim to be from your bank (or any other company) requesting your account details. No bank is ever likely to approach you this way to ask for personal information.

Beware Email Attachments

It’s never a good idea to click on email attachments or free software from unknown sources. You could end up exposing your computer (and the information on it) to online fraud and theft. Keep in mind that links you receive in emails or in messages on social networking sites can be harmful or fraudulent, even if they appear to come from friends.

Facebook
Instagram