- Choosing a strong password
- Changing the password often
- Installing software updates as soon as alerts are received
- Avoiding opening suspicious emails or online links
- Never downloading unauthorized software or apps on company computers or smartphones
- Automated Clearing House payments – an electronic network for financial transactions
- Secure Point of Service terminals – an electronic device used to process card payments
- Devise a step-by-step written communication plan detailing how your firm will conduct ongoing monitoring and maintenance, and recover normal operations should a cyber attack occur;
- Identify at-risk assets, such as systems, data and financial operations;
- Protect each asset with tools such as IT security, off-site/cloud backup and vendor protection measures;
- Develop an automatic alert system to detect incidents that indicate current or imminent threats to system integrity and lost or compromised data; and
- Create a response plan that encompasses worst-case scenarios and contingency planning, staff training, written procedures, reporting and outreach communications to staff, vendors, customers and the public, if necessary.
%20-%20TGP.jpg?width=3558&height=1110&name=Logo%20with%20Tagline%20in%20Color%20(No%20Website%20Address)%20-%20TGP.jpg)