WHITECAP’S BACK-TO-SCHOOL CHECKLIST

CYBERSECURITY EDITION

The back-to-school sprint is finally behind us. Hopefully everyone off to a strong + secure start to the fall semester.

At WHITECAP Technologies, we’re going Back to School to ensure you’re ready for whatever comes your way when it comes to CyberSecurity. After all, it’s never too late for a refresher on how to stay ahead of cyber threats and safeguard your data.

REQUIRED READING:

Update Essential Resources

Just like a student who needs the latest textbooks, you’ll want to similarly make sure your business has the latest + greatest technology to make sure you have the right resources in place.

To do this, be sure to have the latest versions of the operating systems, apps, and antivirus software vital to your operations. Outdated software is like using antiquated textbooks that are full of holes when it comes to current events. Keep in mind patch notes can also function as a study guide, outlining the changes in a software release to demonstrate exactly what has been fixed, added, or improved. This can be helpful with demonstrating value as well as continuing education and training for the teams using those resources.

As part of your audit, review the programs available to your staff and whether the software still meets their needs. Uninstalling inessential software can not only free up space but also limit inroads for cyber threats.

SECURE YOUR LOCKER:

Maximize Security Protocols

While students may leave their books and belongings in a locker with a simple padlock, your data needs much more when it comes to safeguarding. Traditional password-only approaches are being fast outpaced by modern security standards including two-factor, or multi-factor, authentication and biometrics such as fingerprints or facial identification.

Encourage your users to use the strongest passwords or passphrases without taking any shortcuts (no “1234” locker combinations permitted). You can also consider bolstering security requirements by adding verification codes, leveraging hardware security keys, or using authenticator apps to create the best combination for your overall data “locker”.

KEEP TO A SCHEDULE:

Run Routine Reviews

All students need to follow a schedule whether they want to or not. It’s just the way it is. Establishing a routine schedule for security checks is a requirement for any business serious about CyberSecurity. Be sure to regularly check for suspicious activity on your accounts and devices. Weekly is good; biweekly is better.

Catching people, and systems, off their guard can also be a great time to check that they’re following the proper protocols. In addition to regularly scheduledreviews, consider running a pop quiz to test your incident response skills, for example, to see how your teams handle a lost device or suspicious activity.

DO YOUR HOMEWORK:

Create Backups

With assignments distributed with set deadlines, students are well accustomed to turning in homework on (or even ahead) of schedule. Today, many homework tasks are submitted digitally, but that doesn’t mean the student isn’t saving copies just in case there’s an issue.

Likewise, you should secure your homework by running regular backups to a secure cloud or external hard drive. Think of it as handing in your assignment before the due date. Redundancy is also important to ensure that if one source fails or loses data, backups from other locations can be called upon seamlessly.

WORK TOGETHER:

Use Collaborative Tools

Group projects present their own unique challenges to students of all ages, but they teach valuable skills when it comes to learning how to work together, communicate effectively, and build confidence. Most working environments are collaborative in one way or another as well, paving the way for teamwork as well as often-overlooked CyberSecurity gaps.

When establishing group projects, be mindful of who has access to shared files both inside and outside your organization. Use encrypted file sharing whenever possible. Team leaders should also review and update access permissions on shared documents and drives. Software platforms that invoke a zero-trust policy can help restrict access to only those who require it, at the level of access you establish. Other collaborative tools, such as those for project and personnel management, can be used to create transparency around tasks and obligations while limiting access to the right individuals.

MAKE THE GRADE:

Create a Report Card

Just like being graded on how well a student understands a subject, you will want to not only grade your teams on their performance but also your systems.

Conduct regular audits and create your own report card to ensure that the devices and accounts initially established with the right protocols remain secure. You can also regularly meet with your team to discuss security concerns or incidents, aiming for a zero-incident report every month by being proactive.

WHITECAP: Connecting People + Business to Intelligent Technology

CLOUD 

Desktop as a Service (DaaS)

Hybrid Cloud

Disaster Recovery

TELEPHONY

Hosted PBX

Unified Communications (UCaaS)

Voice Services

HARDWARE

Professional Services

AV Conferencing

Workforce Collaboration

NETWORKING

SD-WAN

MPLS

Expense Analysis

MOBILITY

Mobile Solutions

Device Management

Workforce Applications

SECURITY

AI

Wifi + Firewalls

Content Filtering