The 12 Days of Cybersecurity: Best Practices for Businesses

Vivian Lee

On the first day of Cybersecurity, my IT team gave to me:

A patch for every vulnerability.

On the second day of Cybersecurity, my IT team gave to me:

Two-factor login,

And a patch for every vulnerability.

On the third day of Cybersecurity, my IT team gave to me:

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fourth day of Cybersecurity, my IT team gave to me:

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the fifth day of Cybersecurity, my IT team gave to me:

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the sixth day of Cybersecurity, my IT team gave to me:

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the seventh day of Cybersecurity, my IT team gave to me:

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eighth day of Cybersecurity, my IT team gave to me:

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the ninth day of Cybersecurity, my IT team gave to me:

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the tenth day of Cybersecurity, my IT team gave to me:

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the eleventh day of Cybersecurity, my IT team gave to me:

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

On the twelfth day of Cybersecurity, my IT team gave to me:

Twelve threat feeds streaming,

Eleven alerts for phishing,

Ten plans for testing,

Nine admins limited,

Eight files encrypted,

Seven vendors vetted,

Six backups running,

Five phishing drills!

Four VPN tunnels,

Three strong passwords,

Two-factor login,

And a patch for every vulnerability.

Cybersecurity isn’t seasonal. It’s a year-round commitment. But during the holiday rush, vigilance matters more than ever. Implement these 12 steps to keep your business safe and your customers confident.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Podcast: Basics of Cybersecurity and What You’re Securing

 In our latest podcast, Basics of Cybersecurity and What You’re Securing, we interviewed Pat Gorman, a seasoned cybersecurity professional. With over 18 years in IT, he shares valuable insights for aspiring professionals. Pat excels in team man
Vivian Lee
>>Read More

What is Multi-Factor Authentication and Why Should Your Company Use It

What is Multi-Factor Authentication? In today’s digital age, security is more important than ever. With the increasing number of online transactions and access to sensitive information, it is crucial to have a secure authentication process in place. Th
Avatar photo
Andy Gritzer
>>Read More

Identity Security Basics for SMBs: MFA, Least Privilege & More

Identity Security Basics Every SMB Should Know (Before Identity Management Day) For most small and mid-sized businesses (SMBs), identity has quietly become the new security perimeter. Employees work remotely. SaaS apps multiply by the month. Cloud infr
Vivian Lee
>>Read More