Protecting Critical Systems from Compromise

| << List all articles


Share it now!

Today’s malware is more than your CD drive opening seemingly on its own or a series of annoying popup windows screaming that you were hacked. Certain types of malware, such as ransomware and botnets, can cripple a business.

This can prove to be particularly costly when files go missing or programs are unable to execute. Before this happens, there needs to be more resources allocated to adequately defending these vital systems. It is possible to anticipate, prevent, and respond to cyber attacks.  Below are four tips from Info Exchange,  cyber security experts in Jamaica

Backup and Secure Your Data

Regularly backup and secure your data so that it can be recovered in the event of an attack. Backups should be encrypted and not kept on the same network as the originals. Using our cloud-based backup system, DataVAULT, critical data would be stored in mirrored, geographically-separate data centres ensuring that the data is not affected by the same natural disasters.

Update all Systems Regularly

All programs, software, operating systems, and firmware should be updated as soon as possible once required. Security systems should be setup to scan and auto-update regularly. If the scans find vulnerabilities, the program or software should be patched immediately.

Manage Permissions

By only allowing users permission to the files necessary to their position, it is possible to prevent the unwanted execution of programs in areas common to ransomware, such as temp folders. Also, only active employees should still have login credentials. Upon termination, users should lose access to all company files.

Use Common Sense

Only download files or programs from trusted sources, and only do so when necessary. Evaluate all unsolicited emails or odd requests before acting on them. If an employee from accounting suddenly asks for the security scan results, it might be a good idea to call or go visit that employee to determine if the request is genuine. Finally, make training and awareness a priority. The more ways that people are aware that information is stolen, the better they can avoid having their own data compromised in similar situations.

Any vulnerability in a critical information system can be exploited resulting in the loss of revenue, customer confidence, property.. By implementing the best practices outlined above, the incidence of ransomware attacks can be drastically decreased. If your organisation is unsure how to implement these practices, Info Exchange provides secure hosting to Jamaica. Contact us at www.infoexchangeja.com, email mybusiness@infoexchangeja.com, or call (876)931-9552 for more information on this and other services offered.

Share it now!