top of page
Abstract Background_edited_edited.jpg

Back to Basics - Part 2: Asset Protection

Devices or assets - think laptops, computers, mobile devices, tablets, or servers - are instrumental to performing daily business operations. Because they are crucial for day-to-day operations, it makes them also the target of cybercriminals.

Consider the following recommendation to create a more secure posture of devices to prevent unauthorized access.

  1. Utilize modern Managed Endpoint Detection & Response (MDR) solutions to protect and monitor endpoints. Do not rely on the consumer-grade anti-virus solutions that come with purchased devices.

  2. Uninstall unnecessary software to reduce the attack surface.

  3. Set up end-users using the “least privilege” methodology.

  4. Automatically lock devices after a predefined duration of inactivity.

  5. Enforce complex passwords or PIN codes. Better yet, use a hardware token to secure the login process further.

Benefit: A well implemented approach can detect, block, remediate cyber threats almost in real time. This reduces the risk of falling victim to a wide-spread cyber incident that spans across the entire organization - think threat containment.

Have questions? Schedule a 20 minute call https://tiny.proactivediscovery.com/book-cyber-call

4 views

RESOLUTE is a fully-managed cyber risk mitigation service that helps boutique and SMB (small to medium-size business) organizations protect, mitigate, and prepare against constantly evolving cyber threats.

bottom of page