Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit:



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 24 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Solutions Blockchain Updates Mobile Device Management WannaCry Saving Money Ciminal Virus Computer intranet Networking Social Engineering Internet of Things Virtualization NFL Google Maps Phishing Tablets IT support File Sharing Mobile Devices Data Theft Websites App Vulnerability BYOD Smartphone Telephone Innovation Unsupported Software Audit Small Business Data Security Personal Information iPhone Business Continuity Technology Word Google Gadgets WiFi IT Management Hosted Solution Apple Tech Term Collaboration Microsoft Business Android Encryption Hardware Microsoft Word Ransomware User Tips Data Recovery Data Management Content Filtering Cybercrime Workers Fraud Sports Software OneNote IT Support Credit Cards Risk Management SaaS Identity Theft Hackers Best Practice Specifications Flexibility Edge MSP Thank You Screen Mirroring Lifestyle Retail Smartphones Applications Legislation Holiday Windows Ink Shortcut Computers Gifts Cast Artificial Intelligence IT Services HBO Law Enforcement Licensing User Error The Internet of Things Managed IT Services Safety Data Legal Internet Data Backup Government Cortana Operating System Softphones Network Security Privacy IoT History Software as a Service VoIp Charger Business Management Office 365 Apps Cloud Chrome Microsoft Office Identities Outsourced IT Mobility Microsoft Excel Update Best Practices Server Proactive Alert Telephone Systems Two-factor Authentication Hosted Solutions Patch Management Outlook Managed IT Comparison Maintenance Conferencing Malware Google Docs Proactive IT Antivirus Automation VPN Browser FAQ Productivity Windows Managed Service Provider Email Efficiency Data Protection Device Security Windows 10 Wi-Fi Congratulations Evernote Tech Support Spyware Data Loss Backup Cybersecurity Cloud Computing Marketing Spam Work/Life Balance Google Drive Data Breach Security Business Computing IT budget Devices Emergency Wireless Technology Storage Social Media Sync Tip of the Week eWaste Sales Redundancy Project Management Communications Passwords Wireless Charging Data Storage Adobe Politics Money Commerce Travel Disaster Recovery WIndows Server 2008 Excel Language