Five Cybersecurity Resolutions You Can Cross Off Your List Today! - Macatawa Technologies
20972
post-template-default,single,single-post,postid-20972,single-format-standard,ctct-bridge,wp-featherlight-captions,ajax_fade,page_not_loaded,,qode-child-theme-ver-1.0.13,qode-theme-ver-16.8,qode-theme-bridge,qode_header_in_grid,wpb-js-composer js-comp-ver-6.8.0,vc_responsive,elementor-default,elementor-kit-20895

Five Cybersecurity Resolutions You Can Cross Off Your List Today!

Five Cybersecurity Resolutions You Can Cross Off Your List Today!

  1. Close firewall management interfaces to the internet. It is very common to want to manage your Firebox remotely, and you can do this securely. However, exposing your Firebox management interfaces to the internet is not an industry best practice, and is not recommended by WatchGuard either. Use this Knowledge Base article for three recommendations for enabling secure remote management.
  2. Update to the latest version of Fireware. Start the new year right, with the latest version of Fireware (12.7.2, or the latest of whichever branch your Firebox uses) to ensure your WatchGuard deployment is leveraging the best power, speed, reliability, and security available today. Release notes can be found here.
  3. Change your passwords (now and regularly). Another easy-to-implement industry best practice is to change your passwords regularly. On Secplicity.org, we all too frequently cover breaking news regarding data breaches involving stolen credentials, and how those stolen credentials are utilized by adversaries. Using strong credentials, and changing them often, helps prevent lost or stolen credentials from being useful to the bad guys. You should equally follow this advice on your hardware appliances, for example regularly changing your Firebox credentials.
  4. Implement Multi-factor Authentication (MFA). Using strong passwords, and changing them regularly, is a vital step, but you should also consider adding MFA, too! Implementing MFA to verify identities renders lost or stolen user credentials worthless to adversaries.

Watch to learn how hackers might target space, what will happen with cyber insurance, Zero Trust, and more! You can find them here.