On January 14, 2020, Microsoft will end its support for Windows 7 and Server 2008. But just because you can continue to use Windows 7 after the end of life date, it doesn’t mean you should. Businesses who rely on technology to keep them running are proactively upgrading their Windows environment to avoid downtime, user issues, loss of functionality with other applications and increased security vulnerabilities. Continue reading →
Ransomware and most malware attacks start in two main ways. A booby-trapped email with a malicious attachment or via a compromised website; which then work their way down to your endpoints and servers.To stop these attacks, it is critical that you have a multi layered approach to security.
This starts with a training your employees and patching your devices right through to cloud based malware filters, dedicated hardware firewalls and corporate grade security applications on each device.
The eleven best security practices to apply now are:
Regular training for employees is essential. Employers need to inform their staff on what to look out for and don’t trust the contents of every email they receive.
Patch early, patch often The sooner you patch Windows the fewer holes there are for ransomware to exploit.
Backup Backup regularly and keep a recent backup copy off-line and off-site. Offline and off-site means ransomware can’t get to it. With recent backups data loss can be minimized.
Implement corporate grade security software
A free antivirus program might be ok for home use but do you really want a free program protecting your confidential business data and financial information?
Install a firewall or UTM
You probably don’t just rely on a cheap door lock on the front door of your house so why rely on a basic firewall on the electronic entrance to your business?
Enable cloud based email filtering
Don’t rely on your local antivirus software detecting and stopping malware within your email application. Block it before it even enters your network by using using a cloud based filter – one that uses multiple filters is even better.
Enable file extensions.
Enabling extensions makes it much easier to spot file types that wouldn’t commonly be sent to you.
Don’t enable macros in document attachments received via email. A lot of infections rely on persuading you to turn macros on, so don’t do it!
Be cautious about unsolicited attachments
If you aren’t sure – don’t open it. Check with the sender if possible.
Admin Login Rights
Don’t have more login power than you need. Having administrator rights may bake things easier for administration but they also give malware free ranges on your computer and network. An infection which may be able to be contained to one device could become a network disaster is the malware exploits admin rights.
Keep applications up to date.
Stay up-to-date with new security features in your business applications
For example Office 2016 now includes a control called “Block macros from running in Office files from the internet”.