
- Choosing a strong password
- Changing the password often
- Installing software updates as soon as alerts are received
- Avoiding opening suspicious emails or online links
- Never downloading unauthorized software or apps on company computers or smartphones
- Automated Clearing House payments – an electronic network for financial transactions
- Secure Point of Service terminals – an electronic device used to process card payments
- Devise a step-by-step written communication plan detailing how your firm will conduct ongoing monitoring and maintenance, and recover normal operations should a cyber attack occur;
- Identify at-risk assets, such as systems, data and financial operations;
- Protect each asset with tools such as IT security, off-site/cloud backup and vendor protection measures;
- Develop an automatic alert system to detect incidents that indicate current or imminent threats to system integrity and lost or compromised data; and
- Create a response plan that encompasses worst-case scenarios and contingency planning, staff training, written procedures, reporting and outreach communications to staff, vendors, customers and the public, if necessary.