A Cybersecurity Checklist

May 23, 2016

This list of seven best practices to achieve “cyber resilience” is based on Symantec’s 2016 Internet Security Threat Report. Some of these items are familiar – e.g. create “strong” passwords that are changed regularly and not repeated. Others will be eye-openers for some companies. For example, it’s not enough to tell employees not to open attachments. Mail servers should be configured so that certain kinds of attachments, commonly used to spread viruses, can’t be opened at all but instead are blocked or removed. Warning: Some of these best practices are not “solutions,” but rather descriptions in broad outline of ongoing projects that will require work.

Read full article at:

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top