Here are a few keynotes to keep in mind from the Lunch & Learn…
- Record passwords securely.
- Give the most sensitive resources the most complex passwords.
- Treat your email account as your most sensitive resource.
- Report breaches immediately and change passwords on compromised systems.
- For token-based systems, store the token securely.
- Use a password manager with 2 Factor Authentication
Have you ever wondered about how safe your business is from a potential cyber attack?
Do you know what your disaster recovery plans are if one happens?
Does your organization have a disaster recovery plan?
The better we can help you stay secured, the more effective your prevention will be at any cyberattack.