Awareness Training
Compliance
Cybersecurity
Data Management
Information Technology

Perform a Cyberhealth Check-up in 9 Easy Steps

Annual checkups aren’t just for people. They’re important for monitoring your cybersecurity health as well. Regular maintenance and review of your policies, hardware, and systems is the best way to stay prepared and stay safe.

Here are the nine most critical items to consider as you review your organization’s cybersecurity health. And yes, we made it easy and bite-sized.

Digital Assets


Take inventory of your digital assets. Identify and list all devices, software, and networks your organization uses. That’s it. Just a list. Don’t forget your printers and wearables (Apple Watch, etc)! Knowing what you have is the first step in securing it.

User Access

Knowing who has access to what can prevent lateral hacks to your network. Review user access privileges. Ensure employees have the minimum access required to perform their roles. No one should have an “Admin” login aside from your IT team.
That said, work with IT professionals to ensure that reduced access does not get in the way of efficiency and daily tasks. Cumbersome setups lead to  Regularly updating and removing unnecessary permissions minimizes risk.

Password Policies

Encourage strong, unique passwords, but be sure to be consistent throughout your organization. Passwords alone are no longer robust enough protection.
If you do not already, implement multi-factor authentication. Tools are built in natively to most network/operating systems, but a more complex approach might be necessary for business/enterprise accounts. Strengthening your defenses starts with secure access.

Examine your physical security.

When we think about cybersecurity, we often only consider the “digital” aspect. Passwords. Safe browsing. Secure connections. Updated software. Don’t forget about the physical aspect as well. Securing your devices is another way to secure your data.
Ensure servers and networking equipment are in secure locations, and access is restricted to authorized personnel only. Never leave devices logged in and on while you are away from them.

Update your software and systems.

Good news! MSPs usually take care of this for you (mostly). It’s still your responsibility to make sure your phones and other personal devices stay up to date.
Regular updates patch vulnerabilities and protect against emerging threats. This includes those pesky updates right when you unbox something. Items you might not be thinking about: your gaming system, your smartwatch, your Wi-Fi enabled bulbs.

Assess your firewall configurations.

A well-configured firewall is your first line of defense. Make sure your firewall rules align with your organization's needs and are regularly reviewed. A set-it-and-forget-it approach is not ideal. Instead, having a dynamic and iterative approach to your firewall is the best.

Security Awareness Training (SAT) should become a part of your arsenal.

There are tools out there from simple and free to integrated and paid.
People are a crucial part of your security framework. Considering many of the recent large-scale hacks, social engineering played an important part.
Schedule regular cybersecurity training for employees—knowledge is power! Ensure your team is aware of the latest threats and best practices for staying secure online.
Not sure where to start? We can help. Our MSP plans can include SAT, which will provide ongoing training for your team including compliance training.

Review and update your incident response plan.

It’s not enough to just have a plan. Ensure your team knows what to do in case of a security incident, minimizing downtime and potential damage.
One important aspect of this is public engagement. Make sure that a component of your plan includes communication avenues, a designated spokesperson (can be a hired firm), and pre-drafted copy. Maintaining transparency with your clients is a great way to build trust through the incident. As for your data and systems, work with your IT provider or in-house team to plan for a variety of scenarios.

Engaging with an IT specialist.

If you are not entirely sure about your cybersecurity stack or just want a second opinion, an IT provider will be able to tell you where you are excelling and where you’re falling short. Reach out for a comprehensive assessment and ensure your organization's digital landscape is secure and resilient.

Any amount of reworking broad business alignment is daunting. But taking just small steps over time can help you stay more aware and prepared when it comes to cybersecurity. The most important part is getting started!