Here are a few keynotes to keep in mind from the Lunch & Learn…

  • Record passwords securely.
  • Give the most sensitive resources the most complex passwords.
  • Treat your email account as your most sensitive resource.
  • Report breaches immediately and change passwords on compromised systems.
  • For token-based systems, store the token securely.
  • Use a password manager with 2 Factor Authentication

Have you ever wondered about how safe your business is from a potential cyber attack?

Do you know what your disaster recovery plans are if one happens?

Does your organization have a disaster recovery plan?

The better we can help you stay secured, the more effective your prevention will be at any cyberattack.

 

Microsoft Security Recommendations:

Ms Security

We can help you determine risks, implement infrastructure, develop policy, and train your users to keep your business - and your data - safe.