Pub. 14 2019-2020 Issue 5
WWW.NEBANKERS.ORG 18 F ROMASECURITY PERSPECTIVE, IT’S EXTREMELY IMPORTANT TO remember that you’re simply a number on the internet, a number that hackers are regularly scanning, just looking for an opportunity. To protect yourself, consider these five basic cybersecurity steps to mitigate your risk and begin understanding what your network looks like to an attacker from the outside. 1. Know What You Look Like to a Bad Guy If you’re not sure how to find your external IP, simply Google “what is my IP,” which will provide you many different website options. However, it goes beyond just knowing your current external IP address. It’s important tounderstandwhat devices youhave that directly face the internet, and how vulnerable those devices are currently. Runningaquickexternal port scanof your external IPaddress(es) is aquickway tounderstandhowyournetwork is communicatingwith the internet, aswell as ask if there’s a reason certainports are open. Check out these free, online port scanners (or do your own Google research) to give you more information about how your network is communicating across the internet: • https://www.whatismyip.com/port-scanner/ • https://hackertarget.com/nmap-online-port-scanner/ 2. Use a Password Manager Much has been said about how long and complex passwords should be today, as well as how frequently passwords should be changed. Passwords today – especially for business applications and operating systems – are all about length and avoiding reuse, which is a big challenge for most standard users. TECH TALK Top Five Ways to Mitigate Your Risk – The Basics Jon Waldman , Partner, EVP of IS Consulting, SBS CyberSecurity, LLC
Made with FlippingBook
RkJQdWJsaXNoZXIy OTM0Njg2