• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security

Three Cybersecurity Protocols IT Managers Should Prioritize

As cyber attacks are on the rise, what are some protocols IT managers can prioritize among staff?

June 1, 2021 Alyssa Borelli Leave a Comment

1Password Browser Extension
Vitalii Vodolazskyi/stock.adobe.com

Cyberattacks are on the rise and companies are spending more on IT security and risk management technologies, according to a report from Gartner. U.S. President Joe Biden has signed an executive order aimed at improving the nation’s cybersecurity and protecting federal government networks.

The order is in response to several recent devastating cyberattacks, including the Russian compromise of SolarWinds Orion, the Chinese hack of Microsoft Exchange Server and the ransomware attack that shut down the Colonial Pipeline.

Listen: My TechDecisions Episode 131: Biden’s Executive Order On Cybersecurity

What are some protocols IT managers can prioritize among staff, so the company does not fall victim to an attack?

Password Management

Cybersecurity often starts with password management. Password management tools are often a good start, as most help generate strong password that are hacker-proof. Installing multi-factor authentication wherever your accounts support it is another way to make passwords less vulnerable.

Email Vigilance

Are your employees able to spot suspicious emails, attachments, or links? It is important to train employees for some “red flags,” such as emails from unknown senders, spelling mistakes, or uncommon file extensions like .rar. Sometimes it can take one click to cause problems. A Security Boulevard report indicates that “85% of all organizations have been hit by phishing attacks and 97% of users are unable to recognize a sophisticated phishing email.”

Hackers can also easily mimic domain names by changing the sender name, but cannot change the bit after the @[domain name]. Have your staff double check the domain before opening or clicking any attachments.

Installation of Anti-Malware Software

If your employee does click on a harmful link, having anti-malware software setup will help mitigate an attack. The malware software will swat away any viruses or worms that could potentially cause chaos or even a data breach.

Read: Bose Says It Suffered Ransomware Attack

Continue to Refine Cybersecurity Protocols

As cybersecurity is on the rise, IT managers should train employees, consistently review policies and procedures to be safe now and in the future.

Tagged With: Cybersecurity

Related Content:

  • Malwarebytes Mobile Security for Business Malwarebytes Launches Mobile Device Security Solution
  • Microsoft Adaptive Protection Microsoft Launches New Machine-Learning-Enabled Adaptive Protection for Data…
  • OneNote Malware, Proofpoint Hackers Are Pivoting to OneNote Documents for Malware…
  • cybersecurity, vendor risk, third party vendor security risk Research: Vendors Are Introducing Security Risk Into Customer…

Free downloadable guide you may like:

  • Blueprint Series Cover: What works for hybrid workBlueprint Series: What Works for Hybrid Work

    Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Guide to creating a ransomware response plan download
Blueprint Series: Creating a Ransomware Response Plan

Chances are ransomware hackers are researching your company right now. They’re investing time and money to choose the most profitable targets and a...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.