Application Hardening

Be sure to configure your applications to block or disable any unnecessary or required features. For example, it is recommended to configure web browsers to block Flash, ads and Java while browsing the internet. Additionally, be sure to disable any features you aren’t using in Microsoft Office and other everyday applications you are using. Attackers […]

Microsoft Office Macro

It’s important that your system settings are set to block Microsoft Office macros from the internet, only allowing trusted macros with limited write access and with a digitally signed trusted certificate. Microsoft Office macros are an easy way for an attacker to deliver and execute malicious code onto systems.

Daily backups

It’s important to run daily backups on any new and important data, when you change any software and configuration settings and retain these for at least three months. This will help you to access information if you are ever found to be compromised by a cyber-attack.


Ensure to patch operating systems and applications regularly and within 48 hours of any known exploit or vulnerability being discovered. Security vulnerabilities can be used to execute malicious code on vulnerable systems.

Restricting privileges

Ensure to use the principle of least privilege and restrict the use of admin privileges. It is imperative to ensure the practice of limiting access rights for users to the bare minimum permissions for them to perform their work.

Multi-factor authentication

Establish the use of MFA when accessing emails, applications and VPNs and other remote sessions for all users. Stronger authentication methods make it harder for adversaries to access sensitive information.

Application whitelisting

Ensure to utilise the whitelisting of known safe and trusted applications to prevent the execution of unapproved and malicious programs. This will ensure that non-approved applications are not able to be executed.