Home / Articles / Defend Your Company with Our Executive Cybersecurity Checklist

Defend Your Company with Our Executive Cybersecurity Checklist

February 15, 2021

Share:

Cybercriminals are experts at taking personal information from unsuspecting victims, and their methods are getting more sophisticated as technology evolves. Your cybersecurity tools should include advanced barriers and preventative solutions, along with impenetrable policies and procedures. Our Cybersecurity Checklist can help you double-check that your organization is prepared to defend itself in this new age of crime.

Cybersecurity Checklist

  • We have established clear policies and procedures for employees to use our organization’s information technologies.
  • Our defense strategy includes technical, organizational and operational controls.
  • Our controls are properly mapped to a well-known security framework.
  • Our policies include requirements for employee passwords, including mandatory password updates and password strength.
  • Our cyber incident response planning is included in existing disaster recovery and business continuity plans across the organization.
  • We have enabled multi-factor authentication (MFA) to further lock down applications and devices.
  • We conduct regular IT reviews, audits and security tests to eliminate vulnerabilities.
  • We regularly train employees on how to identify and interact with malicious emails, spam, and phishing attempts.
  • We implement technical defenses, such as firewalls, intrusion detection systems, and internet content filtering.
  • We monitor, log, and analyze attempted intrusions to our systems and networks.
  • Our employees’ mobile devices are registered and tracked from an MDM system implementation.

Content adapted from resources produced by the Department of Homeland Security.

CSH Cybersecurity Confidence Quiz

All content provided in this article is for informational purposes only. Matters discussed in this article are subject to change. For up-to-date information on this subject please contact a Clark Schaefer Hackett professional. Clark Schaefer Hackett will not be held responsible for any claim, loss, damage or inconvenience caused as a result of any information within these pages or any information accessed through this site.

Guidance

Related Articles

Article

2 Min Read

IT Audit Guide for Ohio Sports Gaming: Rule 3775-16-2

Article

2 Min Read

Strengthening Cybersecurity for Financial Data Protection

Article

2 Min Read

Fair Lending Compliance: What You Need to Know

Article

2 Min Read

Review Your Security Status With Our CMMC Readiness Checklist

Article

2 Min Read

GLBA Safeguards Rule Compliance Checklist for Higher Education

Article

2 Min Read

Are You Ready for New Regulations Impacting Financial Institutions?

Get in Touch.

What service are you looking for? We'll match you with an experienced advisor, who will help you find an effective and sustainable solution.

  • Hidden
  • This field is for validation purposes and should be left unchanged.