The 12 Days of Cybersecurity: Best Practices for Businesses

Vivian Lee

On the first day of Cybersecurity, my IT team gave to me:

A patch for every vulnerability.

On the second day of Cybersecurity, my IT team gave to me:

Two-factor login,

And a patch for every vulnerability.

On the third day of Cybersecurity, my IT team gave to me:

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fourth day of Cybersecurity, my IT team gave to me:

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fifth day of Cybersecurity, my IT team gave to me:

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the sixth day of Cybersecurity, my IT team gave to me:

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the seventh day of Cybersecurity, my IT team gave to me:

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eighth day of Cybersecurity, my IT team gave to me:

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the ninth day of Cybersecurity, my IT team gave to me:

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the tenth day of Cybersecurity, my IT team gave to me:

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eleventh day of Cybersecurity, my IT team gave to me:

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the twelfth day of Cybersecurity, my IT team gave to me:

Twelve threat feeds streaming,

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

Cybersecurity isn’t seasonal. It’s a year-round commitment. But during the holiday rush, vigilance matters more than ever. Implement these 12 steps to keep your business safe and your customers confident.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Phishing: Beware of the Cyber Witches Casting Email Spells

Double, double, toil and trouble; Fire burn, and let the hijinks bubble! A new form of witchcraft is brewing: phishing attacks! Just like Halloween’s cackling devils, cybercriminals weave dangerous email spells designed to bewitch unsuspecting users. T
Vivian Lee
>>Read More

Podcast: Your Flight Plan for Ransomware Recovery

 Episode Summary Aviation and cybersecurity are two passions for Jim Aldridge. Jim is a practical cyber risk management professional and the Vice President for Partnerships at MOXFIVE. He has been in cybersecurity for over 20 years. Jim flying over s
Avatar photo
Conor Quinlan
>>Read More

Debunking the Myth: Common Misconceptions About Incident Response and Cybersecurity

Misconceptions about cybersecurity can leave businesses vulnerable. To strengthen defenses, it’s vital to debunk common myths about incident response and cybersecurity. By dispelling these misconceptions, businesses gain a clearer understanding of thre