Posted on November 4, 2020 in Cyber Security, IT Support

CyberSecurity – Secure configuration

As we found out in the last article, cybersecurity is an important part of every business in the modern world. Since COVID-19, the U.S FBI reported a 300% increase in reported cybercrimes¹ which highlights the importance of cybersecurity. Here are a few things to look out for.


Managing Permissions

To stop unauthorized access, managing permissions is very important, (by individuals within or outside your organization) to confidential information, sensitive data and system settings. A breach of access could result in malware intrusion, data theft/loss, or deliberate changes to your security settings will likely present opportunities for cybercriminals.


Configuring your system

System configuration control requires businesses to optimize all settings within their network for maximum security, ensure the upkeep of the system with regular maintenance as this lowers opportunities for cybercriminals.

This may sound simple, but breaking down your network into parts and fine-tuning each part to be as secure as possible can be a daunting task to undertake for the unconfident or untrained.


Are you open to attack? An attack could be imminent!

Keeping current and applying security protocols is very important, it requires you to be vigilant and aware of the latest update available. Regular system reviews are essential, be proactive when it comes to maintenance and change your settings accordingly as your business grows and develops. A poorly configured system could leave you vulnerable.


Poorly kept software

Patch management is integral to stop hackers. Failing to have the correct security framework and fixes can leave software vulnerabilities exposed, leading to a greater probability of a damaging cyber-attack.


Keeping yourself secure

Use a vulnerability scanning tool

Vulnerability scanners help to find weak points across networks’ online services, devices, and applications. Make sure these scans are a regular part of your cybersecurity routine.


Avoid removable media and Disconnect unnecessary peripherals

Disable ports to prevent the use of flash drives and other removable media. These devices are common causes of transmission for malware, you should stop the use of them wherever possible.


Shape guidelines for secure system configuration

Form a set of guidelines on how software programs should be set up to ensure maximum security. Perhaps include a rule that apps or services have a multifactor authentication wherever available and if not possible they should be removed from the system immediately. Ensure that you document any cases where the rules cannot be adhered to.


Make a record of all software and hardware

A good start to configuring your network to be secure is to create an inventory of all the software and hardware components of your network. Keep record details such as version, purpose, location, and patch status to help with system maintenance.


We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.


For more information, feel free to send us a message.¹