Page 8 - GS220402
P. 8
ReadersSpeak
Security tips to rely on a password manager.
• Turn on automatic software updates.
iven today's heightened risk of cyber-attacks, • Deliver phishing training and conduct simulated
Michael Aminzade, vice president of profes- phishing exercises. Consider deploying an email se-
sional services at VikingCloud shared the fol- curity solution.
G lowing recommendations for protecting your • Conduct a risk assessment to address risk factors spe-
business from cyber-attacks, both those perpetrated by cific to the Russia-Ukraine military conflict.
freelance criminal hacker organizations and those spon-
sored by nation-states. • Undergo penetration tests and simulated attack sce-
narios to identify vulnerabilities.
"Cyber-attacks happen for several reasons and to a wide • Test your incident response plans and revise the plans
range of companies, not just big organizations. The major- as needed.
ity of hackers don’t care about the size of a business, and,
in some scenarios, small and midsize enterprises are easi- • Focus on Continuity. Ensure business-critical systems
er targets due to their reduced resources and capital. That can continue despite a cyber intrusion. Consider re-
said, despite the ever-changing geopolitical landscape, the dundant connectivity and other backup and resiliency
best practices and principles organizations should employ solutions and conduct continuity tests to verify critical
to defend against nation-state backed cyber threats remain systems will continue to function."
largely the same. Having strong cybersecurity fundamen-
tals in place and a culture of security and compliance is VikingCloud, formerly Sysnet Global Solutions and found
paramount. at www.vikingcloud.com/, helps organizations of all sizes to
prepare for and respond to cyber-attacks.
"The following are top recommendations for all organiza- Dealing with cyber-threats
tions, coupled with guidance and best-practice from gov-
ernment cyber agencies and regulatory frameworks: How has your approach to cyber-security evolved over the
• Raise awareness of elevated threats and educate inter- years? Do you believe you are adequately protected? What
nal team members on security best practices. procedures and practices work best for your organization?
• Require multi-factor authentication. Are there any security issues you haven't been able to
• Require strong, unique passwords in conjunction with solve? Please share your questions and perspectives with
us at greensheet@greensheet.com.