August 18, 2020

Quick Wins Cyber Security

We have summarized the most important points on how you can better protect yourself and your company in the area of cybersecurity in our Quick wins.

← BACK TO THE OVERVIEW

We have summarized the most important points on how you can better protect yourself and your company in the area of cyber security in our Quick wins.

  • Private devices should be considered compromised, and therefore the business use of private devices should be avoided.
  • If this is not possible, the use of external boot media must be checked
  • Disable Office Macros
  • If this is not possible, macro signing should be used
  • Is a collaboration solution sufficient or is a full VPN necessary?
  • If a VPN is used, it should end up in a DMZ (Demilitarized Zone)
  • Use of a 2-factor authentication (but at least for external services such as VPN and WebMailer)
  • Setting up a hard disk encryption
  • Optimal with pre-boot authentication, e.g. 6-8 digit pin or token
  • Separate user accounts (Admin and User
  • Avoidance of inspection by third parties (e.g. use of a privacy film in the web)
  • Use of interface monitoring, whereby only controlled removable media can be used and USB worms can be avoided
  • Use a password manager to avoid single and/or multiple passwords (e.g. KeePass)
  • Increased monitoring on systems that are primarily used by home office users (e.g. VPN endpoint, terminal jump server, etc.)
  • Regular updates of laptop, mobile phone and third-party software, which are often forgotten (e.g. Adobe Reader, Media Player, Internet Browser)