Enjoying what you’re reading? Sign up now.

Subscribe
Search

5 Cybersecurity Recommendations

Cyber attack
Article Highlights:

  • 5 steps to better your cybersecurity.
  • If you can't complete all 5 steps, you may not fully recover from a breach.

Cybersecurity is always in news headlines. Large companies and small business alike are attacked, forced to pay ransomware, or have customer information leaked.

To help you prepare for a potential breach, the Better Business Bureau created five steps a business will need to follow in the event it is hacked. If a business cannot follow these steps, it is unlikely it can fully recover.

The steps include:

1. Identify

Take note of the key technologies you use and the information you need to rebuild your infrastructure. Anything containing personally identifiable information (PII) will need to be at the forefront of your mind when it comes to security.

2. Protect

Put protective measures and policies in place. Always update your computer when an antivirus update is available. In addition, use a networking solution that includes a managed firewall, antivirus, and anti-spyware.

3. Detect

Know when you’ve been attacked. Use a security system that tells you what you have been protected against or when you have been affected. A weekly reporting tool will help you know which of your employees are putting your security at risk, and it can help prevent the problem before it leads to ransomware.

4. Respond

Be able to contain an attack or incident when it happens. Know who to contact for advice and how you can remain running in the short-term when your information has been compromised.

5. Recover

Have a backup of your information ready. The backups should not be connected to your software and need to remain off-site when not in use.

Check with your IT specialist to make sure your networking solutions meet the Better Business Bureau’s recommendations. If you’re not prepared for a cyber attack, see how Reynolds and Reynolds can help.

Share this Article

MariKyle was a Product Planning Manager at Reynolds and Reynolds for Networking, Document Archiving Solutions, and Name File Services. MariKyle, a graduate of the University of Dayton and Wright State University, was with Reynolds for over eight years and held various positions in the Product Planning department.

Related Articles:

Who is your cyber nemesis?

It seems like every week there’s a new foe to your cybersecurity. In 2023, over 72 percent of businesses worldwide were affected by ransomware attacks.

What an Effective Cyber Team Looks Like

Having an effective cyber team in place makes all the difference in whether your dealership falls victim to a cyberattack, but what does this kind

Cybersecurity: Then and Now

While the first computer went online in 1945, the first recorded cyberattack wasn’t until 1970. And the word cybersecurity wasn’t even added to the dictionary

encrypted computer code

Why Cybercriminals Target Dealerships

Dealerships are prime targets for cyber attacks and many auto dealers fail to realize the gravity of this truth. Some consider cybersecurity as just another