The 12 Days of Cybersecurity: Best Practices for Businesses

Vivian Lee

On the first day of Cybersecurity, my IT team gave to me:

A patch for every vulnerability.

On the second day of Cybersecurity, my IT team gave to me:

Two-factor login,

And a patch for every vulnerability.

On the third day of Cybersecurity, my IT team gave to me:

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fourth day of Cybersecurity, my IT team gave to me:

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fifth day of Cybersecurity, my IT team gave to me:

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the sixth day of Cybersecurity, my IT team gave to me:

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the seventh day of Cybersecurity, my IT team gave to me:

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eighth day of Cybersecurity, my IT team gave to me:

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the ninth day of Cybersecurity, my IT team gave to me:

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the tenth day of Cybersecurity, my IT team gave to me:

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eleventh day of Cybersecurity, my IT team gave to me:

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the twelfth day of Cybersecurity, my IT team gave to me:

Twelve threat feeds streaming,

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

Cybersecurity isn’t seasonal. It’s a year-round commitment. But during the holiday rush, vigilance matters more than ever. Implement these 12 steps to keep your business safe and your customers confident.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Airiam Ransomware Recovery Guarantee

The Scourge of Ransomware In recent years, ransomware attacks have become a growing threat to businesses of all sizes. A ransomware attack is a type of cyberattack in which the attacker encrypts the victim’s data and demands a ransom payment in order t
Avatar photo
Conor Quinlan
>>Read More

How to Protect Your Business Against Ransomware Attacks

Ransomware attacks hit a business every 14 seconds. The average cost is $5.37 million, and that doesn’t even include the ransom itself. Ultimately, it’s not about if your business will be targeted, but when. Even companies with billion-dollar security

HIPAA Technology Services

The Health Insurance Portability and Accountability Act (HIPAA) was passed by Congress in 1996. This was the first time that generally accepted standards for the security and protection of health information were brought into existence. In 2009, HITECH
Vivian Lee
>>Read More