Jun 17, 2020
Be sure to configure your applications to block or disable any unnecessary or required features. For example, it is recommended to configure web browsers to block Flash, ads and Java while browsing the internet. Additionally, be sure to disable any features you aren’t...
Jun 17, 2020
It’s important that your system settings are set to block Microsoft Office macros from the internet, only allowing trusted macros with limited write access and with a digitally signed trusted certificate. Microsoft Office macros are an easy way for an attacker...
May 27, 2020
It’s important to run daily backups on any new and important data, when you change any software and configuration settings and retain these for at least three months. This will help you to access information if you are ever found to be compromised by a...
May 27, 2020
Ensure to patch operating systems and applications regularly and within 48 hours of any known exploit or vulnerability being discovered. Security vulnerabilities can be used to execute malicious code on vulnerable systems.
May 27, 2020
Ensure to use the principle of least privilege and restrict the use of admin privileges. It is imperative to ensure the practice of limiting access rights for users to the bare minimum permissions for them to perform their work.