Board Converting News, November 22, 2021

Ransomware (CONT’D FROM PAGE 1 )

keep out the cybercriminals that VPN into your country be- fore attacking you, but it’s surprising how many cybercrim- inals don’t take the time to do that. 7. If you are part of a company with many workstations, use the Microsoft Local Administrator Password Solution (LAPS) to randomize the local administrator password on all PCs. If you have the same initial local admin username/

Stopping ransomware includes three key areas: Cyber- security hygiene of your employees, proper practices by your IT department, and your data backup strategy. Here are 8 ways to prevent a ransomware attack, and 8 ways to recover from an attack if you fall victim to one: Ransomware Defenses to Help Prevent Attacks: 1. Add Multi-Factor Authentication (MFA) on all of your company’s email accounts and on all external access to your network (VPN, TeamViewer, WebEx, etc.). This will help prevent a cybercriminal from taking over an email ac- count using a compromised username/password. 2. If your company uses Windows Active Directory, do NOT log in to computers with Domain Admin accounts. There is an attack called “Pass the Hash” that will steal encrypted (hashed) credentials left behind. If you must log in with a Domain Admin account, change the password. 3. Patch your PCs. Workstations and servers. Every month. No exceptions. That includes conference room PCs, loaner PCs, HVAC computers, etc. 4. Patch your networking gear. Firewalls, switches, UPSs, phone system, etc. 5. Install good antivirus software everywhere. All PCs. All Macs. All servers. Everywhere. 6. Geofilter your Internet traffic and emails. If you don’t do business with a foreign country, block traffic and emails to/from it. It keeps out lazy cybercriminals. No, it won’t

password for every workstation, then if one machine gets compromised, it’s very easy for them to all get compro- mised. 8. If your users have local admin credentials, you may want to rethink that. Today. Right now. If a cybercriminal compromises a computer, they normally inherit the permis- sions of the user for that computer. If that user is a local CONTINUED ON PAGE 26

The Leader in Corrugated and Converting machine foundations

Jason Craddock General Manager 864-940-7356 www.zefco.net

Committed to: Professionalism, Accuracy, and Unmatched installation timelines 20+ year experience in constructing corrugated/converting foundations Ability to travel throughout North America

24

www.boardconvertingnews.com

November 22, 2021

Made with FlippingBook - professional solution for displaying marketing and sales documents online