Now that you have read and implemented our 4 step guide to stopping ransomware, you probably want to test to see just how vulnerable your system is. Here are our top four ways to confirm that you and your data are as safe as possible
- Phishing Tests
- Vulnerability Scans
- Penetration Tests
- Network Assessment
We told you that hackers are recruiting your employees and often send phishing emails as a way to gain access to your system. These emails trick the end user into giving away sensitive information that is then used to hack your network. What we haven’t told you until now is you can (and should!) do regular phishing tests yourself. Meaning you send emails that resemble a real phishing email as a way to test your teams savviness. You, or your IT professional, can determine how often the test email goes out, what they look like, and ensure too many people don’t receive at once. Once the test is complete, you receive a list that identifies who clicked on the link and when.
Vulnerability scans are a great way to test for weaknesses in your network. This technique simply cans your network and reports on areas where your security measures fall short.
Penetration Tests, also called ‘pen tests’, describe a situation in which you actively try to hack your network as a way of discovering your systems weaknesses. It is important that these tests are done by neutral third party firms, not the firm or employee who oversees your network.
Similar to a vulnerability scan, a network assessment helps to spot weakness in your network. Unlike a vulnerability scan, a network assessment involves an onsite walk through and evaluation of your infrastructure. A complete network assessment should end with a discussion of pain points in addition to providing short and long term recommendations.
Visit our Cyber Security page for more information.