Reading Time: 6 minutes

6 MINUTE READ

A 2021 Cybersecurity Checklist: How Does Your Organization Rate?

Graphic of hands holding a tablet with a checklist on it

You know cybersecurity is important. You hear about ransomware, viruses, and cyberattacks nearly every day. And you sense that your current cybersecurity defenses may not defend you in case the worst happens. Yet, it can be so easy to put off improving cybersecurity. Why? Often, it’s difficult to know where you should begin.

As a way to start building a plan, use this cybersecurity checklist to rate your organization. It will take you through foundational items, advanced items, and long-term cybersecurity strategies—and explain why each is important. Rank each item:

  • Yes (I am confident my organization has addressed this item.)
  • No (My organization needs to address this item.)
  • Don’t Know (I am not sure if my organization has addressed this item.)

Obviously, you want more items in the “yes” category than in the “no” or “don’t know” categories! The important thing is that you identify cybersecurity gaps so that you have a list of items to remedy by level of importance.

Foundational Items

1. Data backup and disaster recovery

To ensure you can recover data after a successful cyberattack, your data backup and disaster recovery needs an onsite component (for quick recovery in case of a server failure or similar incident), an offsite component (in case of a severe cyberattack such as ransomware), and a testing component (to ensure that you can actually recover your data after an incident).

2. Antivirus

Antivirus software is one of the most basic tools of a cybersecurity defense. It’s likely you have some sort of antivirus software, but it’s important you use an enterprise-grade rather than a consumer-grade version.

3. Antispam / email filtering

Basic antispam and email filtering tools make sure that most junk email—including many potential phishing email messages that could trick employees into downloading a virus or giving away sensitive and confidential information—never gets to your employee’s inbox.

4. Software patching

Many devastating cyberattacks have been successful simply because organizations do not patch software vulnerabilities. Operating system and application vendors regularly provide software patches that shore up security vulnerabilities. Applying these patches is an essential part of a cybersecurity strategy.

5. Firewalls

Appropriately configured firewalls block most malicious website traffic.

6. Monitoring and alerting

It’s important that experienced IT professionals monitor your systems and provide you security notifications when something seems wrong. This way, you start to proactively get ahead of security issues.

7. Password policy

Organizations need to create a policy that enforces the use of strong passwords or passphrases and the use of Two-Factor Authentication (2FA), as many cyberattacks succeed when criminals hack weak passwords.

8. Encryption

Encryption of backup data, emails, files, and other important information ensures that unauthorized users cannot read this data if they steal or hack into it.

9. Secure connection for remote employees

If someone remotely accesses your organization’s data, you need a VPN or secure browser to make sure the connection does not expose you to cyberattacks. This is especially important when employees use a poorly secured wi-fi connection (such as public wi-fi) or a home network that’s not secured properly.

10. Secured wi-fi access points

Many cyberattackers take advantage of an organization’s unsecured wi-fi access points to enter your network. Wireless routers need proper setup and configuration to ensure they are secure.

11. Secured website

Whether cybercriminals deface websites or hack into them as a way into your network, they are an easy target. It’s important to use a trusted hosting provider and secure services (such as online payments).

12. Physical security

Often overlooked in a cybersecurity strategy, physical security is important—including everything from properly escorting guests to locking rooms containing servers and computers.

13. Employee training

Despite the best cybersecurity defenses, an employee tricked by a phishing email or malicious website can allow a virus into your network. Periodic employee training helps teach them how to detect and avoid common cyber threats.

14. IT asset inventory

An IT asset inventory is important to cybersecurity. If you don’t know how many servers and computers you have, and where they are, then how do you know they are secure and out of unauthorized hands?

Advanced Items

Once your security foundation is established, the following items begin to enhance your strategy.

15. Intrusion detection and prevention

As a more advanced form of basic monitoring and alerting, intrusion detection and prevention tools work with your firewall to detect and prevent attacks related to specific vulnerabilities—often automatically stopping such attacks.

16. Security scanning

Regular security scans of your systems help identify vulnerabilities and holes that you can then fix.

17. Enterprise-grade email

Enterprise-grade email offers much better security than consumer-grade email, which is not recommended for organizations. IT professionals can also better manage and secure your enterprise-grade email.

18. Malware and content filtering

Special tools can detect and filter out malware while also placing restrictions on what internet content employees can access. This helps prevent them from downloading malicious files and software.

19. Dark Web monitoring

The Dark Web allows for anonymous browsing with specialized software. Many use the Dark Web for illicit and illegal activity. IT professionals can monitor the Dark Web in case account credentials (such as administrative passwords) or stolen customer information appears on the black market.

20. Policies

Setting information security policies will help you enforce cybersecurity across your organization. Policies include:

  • General controls: Your organization needs policies for contract / vendor management, network security, wireless network security, physical access security, logical access security (which includes user authentication), and disaster recovery / business continuity.
  • Application controls: These policies help you with data processing along with security, configuration, and contingency planning related to applications.
  • Decommissioning and disposing of data and equipment: Deleting data sometimes doesn’t mean it’s really deleted, and equipment thrown away may still have data on it. You need policies that detail how you decommission and dispose of your equipment and the data on it.
  • Employee screening and background checks: This policy may seem unrelated to cybersecurity, but strong employee screening and background checks lessen the chance of hiring a criminal or disgruntled employee who will attack your organization from the inside.
  • Social media: A social media platform offers cyberattackers administrative credentials and the potential to embarrass your organization, similar to defacing your website. Creating a social media policy around access and use will help lessen this type of cyberattack.

Long-Term Strategy

Once your foundation and advanced strategy is in place, there are several steps you can take to make sure that your cybersecurity remains strong into the future.

21. Modernized and upgraded software

Newer software is more secure than aging software, which vendors sometimes no longer support. It’s important to keep your operating systems and applications modern and upgraded.

22. Modernized and upgraded hardware

The same reasoning applies to hardware—keep it modern and upgraded. Old, aging hardware contains more security vulnerabilities than newer hardware.

23. Incident response planning

Developing a plan detailing how you respond to a cyberattack will help you react to an incident with “muscle memory”—rather like a fire drill. Your team will know exactly what to do.

24. Network segmentation

You may decide to segment and separate certain parts of your network from other parts. This way, for example, if ransomware were to infect one department’s servers, the virus would not be able to infect another department.

25. Mobile strategy

Many employees may access your organization’s data through their smartphones, tablets, and laptops. If so, you need a mobile security strategy—whether it’s issuing work-only devices to employees or providing secure access to sensitive and confidential data if they use a personal device.

26. Compliance strategy

Depending on laws and regulations you must follow, security and compliance often go hand in hand. Developing a compliance strategy will require you to stay on top of security measures related to data breach notification, data privacy, and other important areas.

27. Cyber liability insurance

Improving your security foundation will help you lower cyber liability insurance premiums. If you don’t have cyber liability insurance, it’s a good idea to acquire some—as it will help offset the expensive costs of a cyberattack’s aftermath.

28. Periodic security assessments

Security and technology change rapidly. Assessing your organization’s security periodically (such as annually) will uncover new gaps and vulnerabilities, allowing you to stay ahead of a cyberattack.

Ready for Better Cybersecurity?

Cybersecurity moves fast. Are you ahead of the cyberattackers? Having a strategic, proactive IT partner will help you shore up cybersecurity gaps and prevent cyberattacks. Learn more about our managed cybersecurity services.

VC3 partners with over 400 organizations across the United States to improve their IT and reduce their cybersecurity risks. A strategic technology partner can work with you to ensure that you do not suffer severe consequences from ransomware or another cyberattack. We can assess your cybersecurity risks, outline what you need to secure your IT assets, and help you build a budget and roadmap to get there. Complete the form below and we’ll schedule a free cybersecurity consultation with you to learn more about your cybersecurity needs.