Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit:



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Hosted Solution Audit Data Breach Students Hackers Productivity Vulnerability Business Computing Softphones Word Adobe WIndows Server 2008 VoIp Identity Cast WiFi Smartphones Chrome Saving Money Tech Term Data Storage Cloud Security Work/Life Balance Smartphone Cloud Computing Employer-Employee Relationship Update Flexibility Retail Social Media Outsourced IT Gmail Mobile Security Fraud Backup Travel Sales eWaste Storage Data Security Connectivity Business Management Identities Gifts Spyware SaaS Cybercrime Maintenance Memory Email Business Continuity Managing Stress Updates Office 365 Licensing Specifications Hard Drive Device Security Lifestyle Spam Hardware Workers Google Maps Commerce Data Recovery Communication Cortana Encryption Cybersecurity IT Services Microsoft Redundancy Outlook Passwords Operating System Browser Thank You File Sharing Websites Wireless Technology Holiday Twitter Wireless Internet Networking Cost Management Virus Language Credit Cards Blockchain Microsoft Office Windows Ink Apple Antivirus IT support Windows Law Enforcement User Tips Value Application Disaster Recovery Google Docs Big Data Sports Business intranet Software Streaming Media Hybrid Cloud Hosted Solutions BDR Wireless Charging The Internet of Things Mobile Device Management Charger Compliance Google Assistant Malware Mobile Devices Microsoft Word Conferencing MSP Data Google Drive Alert Telephone Systems Money Artificial Intelligence Bring Your Own Device App Legislation Data Backup Internet Project Management Collaboration Phishing Vendor Management Excel Best Practices Innovation Management Computer App store Virtualization Unsupported Software Data Loss NFL Gadgets Patch Management IT budget Content Filtering Small Business Wi-Fi Managed Service Provider Efficiency Managed IT services Managed IT Services IT Management Devices Telephone Server Politics Monitoring Computers Safety VPN Google Data Management Microsoft Excel Financial Technology OneNote Technology Government Social Engineering Computing Financial Apps Communications User Error Congratulations Windows 10 Identity Theft Evernote Tech Support Managed IT Mobility IoT Automation Remote Computing Android Analysis Data Privacy Edge Internet of Things Education Two-factor Authentication BYOD PowerPoint Proactive IT History Cleaning Privacy Risk Management HBO Proactive Screen Mirroring Data Protection Unified Communications Chromebook Company Culture Ransomware Tip of the Week Software as a Service Network Security iPhone Smart Tech Marketing Emergency Gamification WannaCry Sync Tablets Ciminal Personal Information Network IT Support Content Filter FAQ Printing Best Practice IT Solutions Data Theft Shortcut Legal Applications Comparison Remote Monitoring Computer Forensics Router