Home / Articles / Defend Your Company with Our Executive Cybersecurity Checklist

Defend Your Company with Our Executive Cybersecurity Checklist

February 15, 2021

Cybercriminals are experts at taking personal information from unsuspecting victims, and their methods are getting more sophisticated as technology evolves. Your cybersecurity tools should include advanced barriers and preventative solutions, along with impenetrable policies and procedures. Our Cybersecurity Checklist can help you double-check that your organization is prepared to defend itself in this new age of crime.

Cybersecurity Checklist

  • We have established clear policies and procedures for employees to use our organization’s information technologies.
  • Our defense strategy includes technical, organizational and operational controls.
  • Our controls are properly mapped to a well-known security framework.
  • Our policies include requirements for employee passwords, including mandatory password updates and password strength.
  • Our cyber incident response planning is included in existing disaster recovery and business continuity plans across the organization.
  • We have enabled multi-factor authentication (MFA) to further lock down applications and devices.
  • We conduct regular IT reviews, audits and security tests to eliminate vulnerabilities.
  • We regularly train employees on how to identify and interact with malicious emails, spam, and phishing attempts.
  • We implement technical defenses, such as firewalls, intrusion detection systems, and internet content filtering.
  • We monitor, log, and analyze attempted intrusions to our systems and networks.
  • Our employees’ mobile devices are registered and tracked from an MDM system implementation.

Content adapted from resources produced by the Department of Homeland Security.

CSH Cybersecurity Confidence Quiz

All content provided in this article is for informational purposes only. Matters discussed in this article are subject to change. For up-to-date information on this subject please contact a Clark Schaefer Hackett professional. Clark Schaefer Hackett will not be held responsible for any claim, loss, damage or inconvenience caused as a result of any information within these pages or any information accessed through this site.

Guidance

Related Articles

Article

2 Min Read

CSH Announces New Shareholder and 2021 Promotions

Article

5 Min Read

4 Benefits of Custom Software Applications

Article

4 Min Read

Strained VPN capacity: a must-solve with a remote workforce

Article

2 Min Read

What scares me the most: cybersecurity concerns from the IT Director

Article

2 Min Read

Gauge Your Cybersecurity Risk Level

Article

2 Min Read

Business continuity plans can get you through a crisis

Get in Touch.

What service are you looking for? We'll match you with an experienced advisor, who will help you find an effective and sustainable solution.
  • Hidden
  • This field is for validation purposes and should be left unchanged.