Application Hardening

Application Hardening

Be sure to configure your applications to block or disable any unnecessary or required features. For example, it is recommended to configure web browsers to block Flash, ads and Java while browsing the internet. Additionally, be sure to disable any features you aren’t...
Microsoft Office Macro

Microsoft Office Macro

It’s important that your system settings are set to block Microsoft Office macros from the internet, only allowing trusted macros with limited write access and with a digitally signed trusted certificate. Microsoft Office macros are an easy way for an attacker...
Daily backups

Daily backups

It’s important to run daily backups on any new and important data, when you change any software and configuration settings and retain these for at least three months. This will help you to access information if you are ever found to be compromised by a...
Patching

Patching

Ensure to patch operating systems and applications regularly and within 48 hours of any known exploit or vulnerability being discovered. Security vulnerabilities can be used to execute malicious code on vulnerable systems.
Restricting privileges

Restricting privileges

Ensure to use the principle of least privilege and restrict the use of admin privileges. It is imperative to ensure the practice of limiting access rights for users to the bare minimum permissions for them to perform their work.