Search
Close this search box.
Home / Articles / Defend Your Company with Our Executive Cybersecurity Checklist

Defend Your Company with Our Executive Cybersecurity Checklist

February 15, 2021

Share:

Cybercriminals are experts at taking personal information from unsuspecting victims, and their methods are getting more sophisticated as technology evolves. Your cybersecurity tools should include advanced barriers and preventative solutions, along with impenetrable policies and procedures. Our Cybersecurity Checklist can help you double-check that your organization is prepared to defend itself in this new age of crime.

Cybersecurity Checklist

  • We have established clear policies and procedures for employees to use our organization’s information technologies.
  • Our defense strategy includes technical, organizational and operational controls.
  • Our controls are properly mapped to a well-known security framework.
  • Our policies include requirements for employee passwords, including mandatory password updates and password strength.
  • Our cyber incident response planning is included in existing disaster recovery and business continuity plans across the organization.
  • We have enabled multi-factor authentication (MFA) to further lock down applications and devices.
  • We conduct regular IT reviews, audits and security tests to eliminate vulnerabilities.
  • We regularly train employees on how to identify and interact with malicious emails, spam, and phishing attempts.
  • We implement technical defenses, such as firewalls, intrusion detection systems, and internet content filtering.
  • We monitor, log, and analyze attempted intrusions to our systems and networks.
  • Our employees’ mobile devices are registered and tracked from an MDM system implementation.

Content adapted from resources produced by the Department of Homeland Security.

CSH Cybersecurity Confidence Quiz

All content provided in this article is for informational purposes only. Matters discussed in this article are subject to change. For up-to-date information on this subject please contact a Clark Schaefer Hackett professional. Clark Schaefer Hackett will not be held responsible for any claim, loss, damage or inconvenience caused as a result of any information within these pages or any information accessed through this site.

Guidance

Related Articles

Article

2 Min Read

Is Manufacturing Technology in Industry 4.0 or Industry 5.0?

Article

2 Min Read

Leveraging AI to Add Value to Your Business

Article

2 Min Read

Navigating SOX: How Compliance Shapes Trust and Stability 

Article

2 Min Read

The Vital Imperative: Why Businesses Must Undertake Risk Assessments 

Article

2 Min Read

The Latest on Cybersecurity Regulations from the SEC

Article

2 Min Read

IT Audit Guide for Ohio Sports Gaming: Rule 3775-16-20

Get in Touch.

What service are you looking for? We'll match you with an experienced advisor, who will help you find an effective and sustainable solution.

  • Hidden
  • This field is for validation purposes and should be left unchanged.