Page 139 - Cyber Defense eMagazine January 2023
P. 139
5. Force password changes.
6. Set mobile devices to allow full email addresses and URLs to be viewed.
7. Implement controls to verify requests for changes in account information — this could be as simple
as sending a confirmation message before changes are made.
8. Develop a detailed bring your own device (BYOD) policy that clearly lists responsibilities in plain
language.
9. Verify your backups often — an emergency is a bad time to find out that there’s a problem.
10. Consider introducing endpoint detection and response (EDR)—this uses behavioral-based
analysis to provide threat protection and can provide valuable insight.
Remember, education, preventative maintenance and a proper policy and solution are key to protect both
your business and your customers critical information against cyber attackers.
About the Author
Wendy Taccetta is SVP of Small and Medium Business for Verizon
Business. My team and I are focused on creating the best end-to-
end wireless experience for small business owners who trust their
business to Verizon. Wendy can be reached at
[email protected] and online at LinkedIn here:
https://www.linkedin.com/in/wendytaccetta/ and at our company
website https://www.verizon.com/business/solutions/small-
business/
Cyber Defense eMagazine – January 2023 Edition 139
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.