• IT intelligence from a national leader.

  • IT intelligence from a national leader.

  • IT intelligence from a national leader.

Involta Blog

Preparing Your Company for Potential Cyberattacks

In the last decade, the threat of cyberterrorism has continued to grow, ebbing and flowing in response to political climate shifts and reported data breaches at global companies, including Sony, Equifax, and Marriott.

Shortly after it was reported that Iranian general Qasem Soleimani had been killed in a U.S. airstrike, these reports cycled again, concerning the threat of cyberwarfare retaliation by the second largest country in the Middle East.

It is important to understand that security threats always exist, even without increased geopolitical tensions.  Sean Williams, Director of Security at Involta, shares ways to keep your business and sensitive information more secure.

  • Train your employees in cybersecurity principles.
  • Install, use, and regularly update antivirus and antispyware software on every computer used in your business.
  • Use a Next-Gen (advanced threat capabilities) firewall for your Internet connection and regularly review firewall rules.
  • Make sure IDS/IPS (Intrusion Detection and Prevention) are enabled on the firewall.
  • Download and install software updates for your operating systems and applications as they become available.
  • Run vulnerability scans and patch and/or update vulnerable devices.
  • Monitor devices using a SIEM (Security Incident and Event Monitoring) tool.
  • Make backup copies of essential business data and information.
  • Control physical access to your computers and network components.
  • Secure your Wi-Fi networks. If you have a Wi-Fi network for your workplace, make sure it is secure and hidden.
  • Require individual user accounts for each employee, regularly change passwords and implement multi-factor authentication
  • Limit employee access to data and information based on business need, and limit the authority to install the software

It is often the basics that are overlooked in favor of more advanced security tools and techniques.  Without the fundamentals, it is extremely difficult to control overall security risk.


Download our white paper "9 Common Security Mistakes" to find out what you can do to avoid common mistakes.

For more information on the related Department of Homeland Security bulletin, visit their website.



Topics: IT Security, Cyberattacks