Industry Standards

May 11, 2018, 17:17 PM
Featured Video :
Text Alignment : Left
Underlay Position : Left
Select a choice : YouTube
Has Underlay? : No
Has video : No
Green-Blue-Gradient

Education

In an ideal scenario, no one would have to worry about cybersecurity. In reality, it is a constant threat. The first line of defense is the education of your users and anyone who has access to your data. Implementing a regularly recurring education plan ensures that everyone is up to date on the latest trends and knowledge on how to safeguard your organization. It is not uncommon for organizations to take this a step further, using the knowledge they have to draft a preventative protection plan to help guide and monitor their users. The FCC, Homeland Security, and the US Chamber of Commerce have worked together to provide this guide FCC Cyber Security Planning Guide.

Beware of Phishing

Phishing is a dangerous and common technique used to steal data and passwords by enticing users to click on hyperlinks or download attachments via email. These hyperlinks and downloads typically install malware designed to steal a multitude of information. Again, the best defense here is prevention and education. Users should not open emails from sources that are suspect and should verify the sender’s address or URL before engaging. This can be done by hovering your mouse over the URL to see the domain origin, which you can match against the source of the email.

Maintain Your Software

Another great way to protect your data is to ensure that you maintain compliance with your software provider and have the updated and latest versions of the software. As cyber threats adapt, so too do security protocols to prevent attacks. By having the latest software updates, you are ensuring that the latest security protocols available are protecting your data.

Practice Least Privilege

This article from the U.S. Computer Emergency Response Team details the practice of least privilege and how it can help protect your data. The practice limits the less involved users on what they can access in your system. For example, your organization hires temporary data entry staff to assist during a busy season. These employees do not need access to your whole system. Instead it is safer to limit users’ access only to what is necessary to complete their tasks.

Passwords

Strong passwords are critical to cybersecurity, but knowing how to manage your passwords is equally as important. There are a few things to keep in mind when dealing with passwords. Never give your password to anyone. Do not use the same password in multiple locations. Reset your password on a regular cadence, around every six months. By practicing these simple concepts, you can help ensure that the password protecting your data is protected itself.

Lastly, if you suspect an infraction, please reach out to Blackbaud customer support immediately; a team member will connect you with the Blackbaud security team.

Visit the National Cyber Security Alliance website for more information on Internet safety and security.