In view of the current advanced cyber security threats along with the massive onslaught of the protest-driven-cyberattack; we are proposing a comprehensive review of your oraganization’s current cyber posture. The expected outcome will be a holistic digital transformation of the SOC from the siloed and less optimal operational point into a perfect blend of People, Process, Technology and Governance (PPTG) combined.
Protect yourself from ransomware
Use reputable antivirus software and a firewall
Do not download files from untrusted resources
Do not open untrusted email attachments
Avoid giving out personal data
Never use unfamiliar usb drives
If you are overlooking anything from the list, you are at risk.
Be the hero
We all play a critical role in protecting our company from ransomware. All it takes is just one bad email click to ruin it for everyone. Stay vigilant.
Your Pet’s name is not a password
Create longer, complex passwords that can not be guessed by others
If you have any questions to your technical support
Use strong passwords always
Never share your passwords
Store your passwords securely
Use different passwords for work and personal stuff
Enhance your password security with multi-factor authentication
Use different passwords for different services
Don’t store your passwords on a sticky note around your desk
Create long, complex passwords with no dictionary words
It’s phishing if the email…
Is sent from a public email address
Has improper spelling or grammer
Asks for personal information
Includes suspicious attachments
Has links to sites that misspell familiar URLs
Has the offer of financial rewards
Creates a sense of urgency
Asks you to make a donation
Do not do not be vigilant
Use link in a suspicious email to get to a page. Instead, type in the URL directly into your browser’s address bar.
Reply to suspicious emails
While downloading email attachments on your computer. If in doubt, do not download.
If you think you’ve got a phishing email