The 12 Days of Cybersecurity: Best Practices for Businesses

Vivian Lee

On the first day of Cybersecurity, my IT team gave to me:

A patch for every vulnerability.

On the second day of Cybersecurity, my IT team gave to me:

Two-factor login,

And a patch for every vulnerability.

On the third day of Cybersecurity, my IT team gave to me:

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fourth day of Cybersecurity, my IT team gave to me:

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fifth day of Cybersecurity, my IT team gave to me:

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the sixth day of Cybersecurity, my IT team gave to me:

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the seventh day of Cybersecurity, my IT team gave to me:

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eighth day of Cybersecurity, my IT team gave to me:

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the ninth day of Cybersecurity, my IT team gave to me:

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the tenth day of Cybersecurity, my IT team gave to me:

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eleventh day of Cybersecurity, my IT team gave to me:

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the twelfth day of Cybersecurity, my IT team gave to me:

Twelve threat feeds streaming,

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

Cybersecurity isn’t seasonal. It’s a year-round commitment. But during the holiday rush, vigilance matters more than ever. Implement these 12 steps to keep your business safe and your customers confident.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Webinar: Disaster Recovery and Backups

  The need to protect your business’s data in 2023 will be higher than ever, and with it, the rising standards for storing backups. Disaster recovery and backups should be an ongoing, tested and maintained protection against cybercrime. Watch the
Vivian Lee
>>Read More

Twas The Night Before Christmas – Christmas Cyber Attack Edition

Twas the Night Before Christmas… ‘Twas the night before the Christmas and all through the house, Not a creature was stirring, not even a mouse. The data was collected in the server with care, In the hopes that hackers would never be there. The techs
Vivian Lee
>>Read More

What Is a Security Operations Center (SOC) in Cybersecurity?

The average data breach takes 277 days to identify and contain, costing companies an average of $9.44 million in the United States. For most businesses, that’s an unacceptable timeline and an impossible price tag. A Security Operations Center (SOC) aim