Hackers Are Targeting Businesses Like Yours – Take This Free Cybersecurity Checklist to Stay Protected!

Think your business is secure? If you’re missing even one item on this checklist, your IT systems could be at risk. Don’t leave it to chance – give us a call at Patheown, and we’ll help you close the gaps before it’s too late.

END POINTSWHY YOU NEED THISTHREAT EXAMPLESARE YOU PROTECTED?
Anti VirusProtects data from malicious threats, typically involves scanning on access and at regular intervalsA virus could infect a system, corrupt files and potentially steal data
Anti SpywareHelps protect against unauthorized access of theft of sensitive dataSpyware secretly monitors your user activity, stealing personal information
EDR (End Point Detection and Response)Advanced cyber threat detection that includes a feature to isolate unusual processes for investigationWhen a sophisticated attack evades all defenses, EDR will detect the unusual process and defend
Encrypted DrivesProtects your data in the event of theft or unauthorized accessA physical theft of a device exposes sensitive data if not encrypted
Windows Authentication Required for AccessAssures that only authorized users can access sensitive dataUnauthorized users gain access to systems through weak or compromised credentials.
Critical File Back UpProtects against accidental deletion, hardware failures or cyberattacks. Part of business continuity planningA ransomware attack encrypts critical files, rendering them inaccessible without a backup
Strong User PasswordsRequired to prevent unauthorized access to data and accountsA weak password is easily guessed, allowing unauthorized access.
End Users Receive Cyber TrainingEducates employees about best practices, helping to prevent compromises to the systemPhishing attacks trick users into clicking malicious links or downloading malware.
Centralized Patch Management)Makes sure all devices are updated with the latest security updates, mitigates risk of compromisesUnpatched vulnerabilities are exploited by attackers
Application Installs Need to Be ApprovedVerifies that software in use is authorized and prevents potentially malicious software from being installedUnauthorized or malicious software is installed on systems, posing a security risk.
INFRASTRUCTUREWHY YOU NEED THISTHREAT EXAMPLESARE YOU PROTECTED?
Router Firmware Updated RegularlyAddresses security vulnerabilities and typically includes performance improvementsOutdated firmware can contain vulnerabilities exploited by attackers.
Switch Firmware Updated RegularlyAddresses security vulnerabilities and typically includes performance improvementsSimilar to router firmware, outdated switch firmware can be exploited.
Restricted Physical Access to Network EquipmentPrevents tampering or theft which could compromise network security or dataUnauthorized access could lead to tampering or device theft.
IDS PresentMonitors for suspicious network traffic, sends alerts on discoveriesAn IDS might fail to detect a new or evasive type of attack.
IPS PresentTakes action on detections to halt malicious traffic. Active block for suspicious network traffic.An IPS might not be able to block a zero-day attack.
VPN Access has two factor and strong passwordsHelps prevent unauthorized access, even if a password is compromised.A compromised credential could still grant access if MFA is not implemented.
No Publicly Open RDP PortsRDP ports are commonly exploited by attackers, should be closed to the public and secured by VPNPublicly exposed RDP ports are vulnerable to brute-force attacks.
Firewall is in useFilters incoming and outgoing network traffic and blocks malicious traffic to prevent unauthorized accessA misconfigured firewall could allow unauthorized access.
Default Login for Infrastructure Equipment is ChangedDefault passwords are known by attackers, changing these significantly reduces risk exposureUsing default credentials could allow unauthorized access.
Wi-Fi Network is encryptedScrambles traffic so it cannot be intercepted and accessedUnencrypted Wi-Fi networks are vulnerable to eavesdropping.
Guest Network is Segmented from Main NetworkZero trust for unknown users using the network, prevents malicious threats or activitiesA compromised guest network could be used as a foothold to attack the main network.
Broadcast SSID for Primary Network has been DisabledHiding the SSID makes it more difficult for attackers to find and attempt accessAn attacker could use social engineering to trick users into connecting to a malicious network.
Guest Network Default Name has Been ChangedMakes it more difficult for attackers to identify and target the guest network (for example, don't call it "guest")Using default names could make the guest network easier to discover.
Only needed ports are open on firewallLimits potential entry points for malicious trafficUnnecessary open ports increase the attack surface.
VoIP Phones all have default web admin passwords changedPrevents unauthorized access and control of the phone systemUsing default credentials could allow unauthorized configuration changes.
CLIENT DATA / PI DATA
PROTECTIONS
WHY YOU NEED THISTHREAT EXAMPLESARE YOU PROTECTED?
All assets containing and or with access to data are inventoriedHelps to identify potential vulnerably and security measures. Facilitates detection of unknown devicesUnauthorized access to assets could lead to data breaches.
Policy in place for proper disposal of old equipment (hard drives)Ensures that sensitive data is secured erased. Should outline process for wiping, physical destruction and disposal methodsImproper disposal could result in data leakage.
User access is controlled based on job roles (RBAC)Prevents unauthorized access, data breaches and misuse of company resourcesOverprivileged users could misuse their access to steal or compromise data.
Local Storage is EncryptedProtects against unauthorized access, even if the device is lost or stolenUnencrypted local storage could be compromised if a device is lost or stolen.
Cloud Storage is EncryptedProtects against unauthorized access, makes data only available with proper decryption keysUnencrypted cloud storage could be accessed by unauthorized parties.
Backup Transmissions are EncryptedPrevents data from being intercepted while in transit to the cloud providerBackup data could be intercepted and compromised if not encrypted.
Externally Sourced USB Drives Scanned on InsertionPrevents loading of malicious software by scanning external sources on insertionMalicious files could be introduced through infected USB drives.
Paper Files are LockedKeeps files save from unauthorized accessUnauthorized access to physical documents could lead to data breaches.
Version Controls (or shadow copies) Enabled on Server DrivesProvides essential data protection and recovery capabilitiesData loss or corruption due to accidental deletion or system failures can be mitigated.
Applications containing client PI data are two factor securedPrevents unauthorized access, even if passwords are compromised. An essential security layer for Pl dataUnauthorized access to sensitive data can be prevented.
Passwords are rolled every 90 daysMakes it more difficult for hackers to obtain and exploit passwords.Weak or compromised passwords can be mitigated.
SOP for departing employees and access terminationReduces the risk of authorized access, or breach as a result of a disgruntled employeeUnauthorized access after termination can be prevented.
Computers are set to lock if idleGreatly reduces the risk of someone gaining access to the system without proper authorizationUnauthorized access to unattended computers can be prevented.
Document disposal procedure / processEnsures sensitive information is destroyed securely preventing unauthorized accessSensitive information can be destroyed properly to prevent data leaks.
Local admin permissions are disabledPrevents unauthorized users from gaining control of devicesUnauthorized administrative access can be prevented.
SECURITY MONITORINGWHY YOU NEED THISTHREAT EXAMPLESARE YOU PROTECTED?
Failed logon attempt monitoringTracks unsuccessful attempts to log into systems, helping to identify threats like brute force attacksBrute-force attacks targeting user accounts
Quarterly Penetration TestingSecurity measure that involves simulating attacks to identify vulnerabilitiesVulnerabilities in the network infrastructure
SOP for reporting slow or suspicious network activitySecurity measure that provides a process for reporting potential security incidentsAnomalies indicative of a potential attack can be reported and investigated
User account lock out for failed log in attemptsDisables accounts after unsuccessful login attempts, prevents unauthorized accessBrute-force attacks targeting user accounts
Alerts for new or unknown network devicesNotifies when new or unrecognized devices connect to identify potential unauthorized accessUnauthorized devices connected to the network can be detected
PHISHING PREVENTIONWHY YOU NEED THISTHREAT EXAMPLESARE YOU PROTECTED?
Suspicious Email Reporting SOPProvides a clear process for employees to report potential threats and protect against phishing attacksPhishing or malicious emails
Email secured with 2FAPrevents unauthorized access even if passwords are compromisedUnauthorized access to email accounts
Pl data is only sent via encrypted email or file share utilityPrevents interception of Pl data in transitSensitive data can be protected during transmission.
End user training about suspicious emails and link checkingCrucial security measure that helps to protect the organization from breachesUsers can be educated to identify and avoid phishing attacks.
No personal emails are intermingled with business (acceptable use policy)Reduces the risk of accidental disclosure or compromise of dataBusiness emails can be kept separate from personal accounts, reducing the risk of compromise.
Attachments scanned on openingIdentifies and blocks harmful files, protecting systems and data from infectionMalicious attachments can be detected and blocked.
All bank transfers or wires must be verified verbally or written (preferred)Reduces the risk of unauthorized funds transfers, identifies man in the middle and or compromised attacksUnauthorized financial transactions can be prevented, man in the middle attacks
Phishing simulation program in placeThis helps to educate employees on recognizing and avoiding phishing scamsUsers can be trained to recognize and respond to phishing attacks in a simulated environment.
SECURITY POLICIES AND
DOCUMENTATION
WHY YOU NEED THISTHREAT EXAMPLESARE YOU PROTECTED?
Acceptable Use PolicyEstablishes guidelines for employee behavior and protect company resourcesUnauthorized or inappropriate use of company resources.
Physical Document Destruction PolicyEnsures sensitive data is destroyed securelySensitive information on paper documents falling into the wrong hands.
Equipment/Hard Drive Destruction PolicyEnsures sensitive data is destroyed securelySensitive data being leaked from discarded equipment.
Remote Worker Computer PolicyEnsures secure and compliant use of devices by remote employeesData breaches or security risks associated with remote work.
Incident Reporting PolicyProvides structure for employees to report breaches, enabling quick mitigationTimely detection and response to security incidents.
Business Continuity PlanOutlines procedures for continued operations in the event of a disruptionDisruption of operations due to disasters or security incidents.
Data Backup and Recovery Procedure / PolicyEstablishes guidelines for regularly backing up critical data and restoring it in the case of an eventData loss due to accidental deletion, hardware failures, or cyberattacks.
Infrastructure Documentation (lists all servers, network equipment and purpose)Enables efficient management, troubleshooting and maintenance, of hardware and softwareLack of visibility into network infrastructure, making it difficult to identify vulnerabilities or respond to incidents.
Electronic Records Destruction PolicyEnsures compliance with legal and regulatory requirements preventing unauthorized access to sensitive informationSensitive electronic data being retained longer than necessary, increasing the risk of exposure.
Employee Termination PolicyProvides guidelines for handling employee terminations ensuring smooth transitions and protection of company assetsUnauthorized access to company resources after an employee's departure.
Employee Onboarding PolicyProcedures for welcoming new employees including training and resources and cultural integrationLack of proper training and access controls for new employees.
VPN Access PolicyEstablishes guidelines for accessing company networks remotely, ensures controlled access and data protectionsUnauthorized access to company networks through VPN connections.
Password PolicyEstablishes guidelines for creating and managing strong, secure passwords, protecting accounts from unauthorized accessWeak or compromised passwords leading to unauthorized access.
Network Monitoring PolicyPolicy for identifying potential network threats and ensuring network performance and reliabilityFailure to detect and respond to suspicious network activity.
Support Request PolicyEstablishes guidelines for submitting and handling support requestsInefficient or inconsistent support processes, leading to delays in resolving issues.