The 12 Days of Cybersecurity: Best Practices for Businesses

Vivian Lee

On the first day of Cybersecurity, my IT team gave to me:

A patch for every vulnerability.

On the second day of Cybersecurity, my IT team gave to me:

Two-factor login,

And a patch for every vulnerability.

On the third day of Cybersecurity, my IT team gave to me:

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fourth day of Cybersecurity, my IT team gave to me:

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fifth day of Cybersecurity, my IT team gave to me:

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the sixth day of Cybersecurity, my IT team gave to me:

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the seventh day of Cybersecurity, my IT team gave to me:

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eighth day of Cybersecurity, my IT team gave to me:

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the ninth day of Cybersecurity, my IT team gave to me:

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the tenth day of Cybersecurity, my IT team gave to me:

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eleventh day of Cybersecurity, my IT team gave to me:

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the twelfth day of Cybersecurity, my IT team gave to me:

Twelve threat feeds streaming,

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

Cybersecurity isn’t seasonal. It’s a year-round commitment. But during the holiday rush, vigilance matters more than ever. Implement these 12 steps to keep your business safe and your customers confident.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

How to Build a Future-Proof AI Implementation Strategy

AI implementations are failing at staggering rates.  Recent studies show that 80% of AI projects never make it to production, and those that do often get abandoned. The culprit isn’t the technology, though. It’s the strategy (or lack thereof). Organiza
Jesse Sumrak
>>Read More

Introducing the New Airiam Podcast

Episode Summary In the trailer episode of the Airiam Podcast, we preview what topics the podcast will cover, and share why the show was created. The mission of the podcast is to inform and inspire listeners with stories of cyber resilience and human re
Avatar photo
Conor Quinlan
>>Read More

Podcast: MITRE Organization Explored

 Episode Summary Airiam welcomes MITRE’s Shane Steiger, Esq., CISSP in this episode. We discuss how MITRE came to be and how the frameworks they maintain help companies around the world. The four pillars of their Cyber Resiliency Engineering Framewo
Avatar photo
Conor Quinlan
>>Read More