[ ] Verify all software patches and updates have been installed. Not just laptops and servers, but firewalls and other network devices (routers, switches, APs, office equipment, etc.)
[ ] Implement access control to manage who can access data and restrict from where that data can be accessed.
[ ] Change passwords for network devices; when possible, require multi-factor authentication (MFA)
[ ] Upgrade end of service versions of software your company is using and supports
[ ] Document and train employees on the process for reporting suspicious activity
[ ] Test backups and put at least one version offline monthly (or more often)
[ ] Enable employee multi-factor authentication (MFA) everywhere
[ ] Remove internet-facing management consoles (internal access only)
[ ] Verify everyone in your company has completed security awareness training
[ ] Implement Managed Detection & Response (MDR) on computers and servers to monitor and respond to threats via both technology and human expertise.
[ ] Implement security information and event management (SIEM) software for additional visibility, when possible
[ ] Review cybersecurity policies and corresponding procedures, especially incident response plans and updates have been installed. Not just laptops and servers, but firewalls and other network devices (routers, switches, APs, office equipment, etc.)