Enjoying what you’re reading? Sign up now.


5 Cybersecurity Recommendations

Article Highlights:

  • 5 steps to better your cybersecurity.
  • If you can't complete all 5 steps, you may not fully recover from a breach.

Cybersecurity is always in news headlines. Large companies and small business alike are attacked, forced to pay ransomware, or have customer information leaked.

To help you prepare for a potential breach, the Better Business Bureau created five steps a business will need to follow in the event it is hacked. If a business cannot follow these steps, it is unlikely it can fully recover.

The steps include:

1. Identify

Take note of the key technologies you use and the information you need to rebuild your infrastructure. Anything containing personally identifiable information (PII) will need to be at the forefront of your mind when it comes to security.

2. Protect

Put protective measures and policies in place. Always update your computer when an antivirus update is available. In addition, use a networking solution that includes a managed firewall, antivirus, and anti-spyware.

3. Detect

Know when you’ve been attacked. Use a security system that tells you what you have been protected against or when you have been affected. A weekly reporting tool will help you know which of your employees are putting your security at risk, and it can help prevent the problem before it leads to ransomware.

4. Respond

Be able to contain an attack or incident when it happens. Know who to contact for advice and how you can remain running in the short-term when your information has been compromised.

5. Recover

Have a backup of your information ready. The backups should not be connected to your software and need to remain off-site when not in use.

Check with your IT specialist to make sure your networking solutions meet the Better Business Bureau’s recommendations. If you’re not prepared for a cyber attack, see how Reynolds and Reynolds can help.

Share this Article

MariKyle was a Product Planning Manager at Reynolds and Reynolds for Networking, Document Archiving Solutions, and Name File Services. MariKyle, a graduate of the University of Dayton and Wright State University, was with Reynolds for over eight years and held various positions in the Product Planning department.

Related Articles:

As data goes digital, so do criminals who are after information. Cybercrime is on the rise, and there is no telling what the future may

Storm season brings expected and unexpected disasters. Dealerships need to have a plan in place to help them recover if Mother Nature attacks. According to

The Internal Revenue Service recently issued a warning to be on the lookout for an email scam impersonating their bureau. The email includes the IRS’s

Cyber Monday is the perfect day to score deals this holiday season. With one click, thousands of discounts appear at your fingertips. Can your employees