Enc Project 3 Artifacts 1
Enc Project 3 Artifacts 1
Enc Project 3 Artifacts 1
Alizain Fatehali
ENC 2135
So Young Koo
1 December 2023
Artifact 1:
Fatehali 2
In our interconnected world, ensuring your online safety is paramount, whether you're a
casual internet user or a small business owner. This guide aims to provide a concise overview of
common online security issues and simple, non-disruptive solutions to bolster your digital safety.
Password Protection is crucial. Weak or reused passwords are a significant threat. Use
complex, unique passwords for each account. Consider employing a password manager for
Beware of Phishing Attacks, which often come disguised as emails, texts, or websites
aiming to trick users into sharing sensitive information. Verify sender authenticity before
clicking links or providing personal data. Look for subtle signs of phishing attempts, like
When using Public Wi-Fi, exercise caution. Unsecured public networks expose sensitive
data to potential interception. Avoid sensitive transactions on public Wi-Fi and utilize a virtual
Implement Two-Factor Authentication (2FA) wherever available. This adds an extra layer
Encrypt sensitive data using encryption tools or secure messaging apps to enhance
security.
Regularly backup critical data to prevent loss due to cyberattacks or system failures.
Regularly review and adjust Privacy Settings on social media platforms and other online
integrating these simple practices into your online routine, both individual users and small
business owners can significantly reduce their vulnerability to common cyber threats. Stay
vigilant, update regularly, and prioritize security without compromising usability for a safer and
threats that demand a deeper understanding and proactive measures. This guide aims to provide
an extensive analysis of niche cyber threats specifically targeting the small business sector. It
delves into advanced strategies to safeguard sensitive customer information and day-to-day
- Issue: Phishing attacks have evolved beyond traditional emails to include voice phishing
(vishing), SMS phishing (smishing), and spear phishing targeting specific individuals or
businesses.
advanced phishing attempts. Utilize email filtering tools to identify and block suspicious
messages.
Fatehali 5
- Issue: Ransomware attacks have become highly targeted, infiltrating systems to encrypt data,
- Mitigation: Employ robust endpoint security solutions, regularly back up data, and segment
network access to limit the impact of potential attacks. Create incident response plans outlining
- Issue: Employees or insiders with malicious intent or inadvertent actions can lead to data
- Mitigation: Implement strict access controls, conduct thorough background checks during
hiring, and regularly monitor employee access to sensitive data. Encrypt critical data and enforce
- Mitigation: Vet and monitor third-party vendors and partners for their cybersecurity
practices. Implement protocols for secure data exchange and regularly assess the security posture
- Issue: Cyber attackers exploit unknown vulnerabilities (zero-days) before developers can
- Mitigation: Employ intrusion detection and prevention systems (IDPS) to identify suspicious
activities. Establish a dedicated team to monitor emerging threats and promptly apply security
detecting, responding to, and recovering from cyber incidents. Regularly test and update the plan
cyber threats to educate employees on advanced attack techniques and how to respond
effectively.
Fatehali 7
endpoints.
- Implementation: Implement advanced encryption protocols for data at rest and in transit.
Enforce stringent access controls based on the principle of least privilege to restrict unauthorized
access.
- Implementation: Integrate threat intelligence feeds and services to proactively identify and
respond to emerging threats specific to the business's industry and operating environment.
Conclusion
Cyber threats targeting small businesses have evolved in complexity and sophistication.
Mitigating these advanced risks demands a comprehensive approach that goes beyond basic
cybersecurity measures.
threats, supply chain vulnerabilities, and zero-day exploits, small businesses can proactively
Fatehali 8
fortify their defenses. Implementing advanced strategies such as incident response planning,
continuous training, enhanced endpoint security, robust encryption, and leveraging threat
intelligence is paramount.
Small businesses are not immune to cyber threats, but with a proactive and adaptive
cybersecurity approach, they can significantly reduce the risks and protect both their sensitive
business operations and the valuable information entrusted to them by customers and
stakeholders. Stay vigilant, update defenses regularly, and foster a culture of cybersecurity