Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

3 min read

Small Business Cybersecurity Quick Wins

Small businesses are quickly deploying various technologies to better serve their customers and manage their business more efficiently. Different kinds of technologies, however, come with a variety of risks and, thus, require specific strategies to protect them. Our “Quick Wins” blog and infographic can be used as a starting point as a content outline for your own security awareness training program. 

Icons_Printer

QUICK WINS FOR COPIER / PRINTER / FAX SECURITY.
DIGITAL COPIERS / PRINTERS / FAX MACHINES ARE COMPUTERS TOO.

  • Change the default password to a strong and unique passphrase
  • Ensure devices have encryption and overwriting
  • Take advantage of all the security features offered
  • Secure/wipe the hard drive before disposing of an old device
  • Click here to learn more
Click to download a PDF of the "Small Business Cybersecurity Quick Wins" Infographic

 

Icons_Email
QUICK WINS FOR EMAIL SECURITY.

WHEN IN DOUBT, THROW IT OUT.
BE EXTRA CAUTIOUS WHEN IT COMES TO EMAIL.

  • Require strong, unique passphrases on email accounts
  • Turn on two-factor authentication
  • Do not use personal email accounts for company business
  • Employees should be trained not to open suspicious links in email, tweets, posts, online ads, messages or attachments – even if they know the source. Employees should also be instructed about your company’s spam filters and how to use them to prevent unwanted, harmful email
  • Click here to learn more

Icons_File
QUICK WINS FOR FILE SHARING.

SHARING IS CARING, ONLY WHEN DONE SECURELY.

  • Restrict the locations to which work files containing sensitive information can be saved or copied
  • If possible, use application-level encryption to protect the information in your files
  • Use file-naming conventions that don’t disclose the types of information a file contains Monitor networks for sensitive information, either directly or by using a third-party service provider
  • Free services do not provide the legal protection appropriate for securing sensitive information
  • Click here to learn more

 

 

Icons_Mobile
QUICK WINS FOR MOBILE DEVICES.

KEEP A CLEAN MACHINE FOR ON-THE-GO DEVICES.

  • Update security software regularly. Go ahead, update your mobile software now.
  • Delete unneeded apps and update existing apps regularly
  • Always download apps from a trusted source and check reviews prior to downloading Secure devices with passcodes or other strong authentication, such as fingerprint recognition
  • Turn off Discovery Mode
  • Activate “find device” and “remote wipe”
  • Configure app permissions immediately after downloading
  • Click here to learn more 

 

 

Icons_Credit-Card
QUICK WINS FOR POINT OF SALE SYSTEMS.

HACKERS ARE OFTEN FINANCIALLY MOTIVATED.
DON’T MAKE IT AN EASY PAYDAY.

  • Change from manufacturer's default admin password to a unique, strong passphrase
  • Use a network monitoring app to scan for unwanted users
  • Restrict remote administrative management
  • Log out after configuring
  • Keep firmware updated
  • Click here to learn more

 

Icons_Router
QUICK WINS FOR ROUTERS.

YOUR HOME OR BUSINESS NETWORK IS NOT TOO SMALL TO BE HACKED.

  • Create unique, strong passphrases
  • Separate user and administrative accounts
  • Keep a clean machine: Update software regularly
  • Avoid web browsing on POS terminals
  • Use antivirus protection
  • Click here to learn more

 

Icons_Social
QUICK WINS FOR SOCIAL NETWORKS.

SOCIALIZE ONLINE WITH SECURITY IN MIND.

  • Limit who has administrative access to your social media accounts
  • Set up 2-factor authentication
  • Configure your privacy settings to strengthen security and limit the amount of data shared. At the very least, review these settings annually
  • Avoid third-party applications that seem suspicious and modify your settings to limit the amount of information the applications can access. Make sure you’re accessing your social media accounts on a current, updated web browser
  • Click here to learn more

 

Icons_Computer
QUICK WINS FOR SOFTWARE.

HAVING THE LATEST SECURITY SOFTWARE, WEB BROWSER AND
OPERATING SYSTEM ARE THE BEST DEFENSE AGAINST THREATS.

  • Make sure your computer operating system, browser, and applications are set to receive automatic updates
  • Ensure all software is up to date. Get rid of software you don't use
  • Your company should have clear, concise rules for what employees can install and keep on their work computers
  • When installing software, pay close attention to the message boxes before clicking OK, Next or I Agree
  • Make sure all of your organization’s computers are equipped with antivirus software and antispyware. This software should be updated regularly
  • Limit access to data or systems only to those who require it to perform the core duties of their jobs
  • Click here to learn more

 

 

Icons_Third-Party2
QUICK WINS FOR THIRD PARTY VENDORS.

DO YOUR DUE DILIGENCE,
GET IT IN WRITING AND MONITOR COMPLIANCE.

  • Spell out your privacy and security expectations in clear, user-friendly language to service providers
  • Understand how their services work and to what you are giving them access
  • Build in procedures to monitor what service providers are doing on your behalf
  • Review your privacy promises from the perspective of a potential service provider
  • Spell out expectations and scope of work in a formal agreement/contract
  • Click here to learn more

 

 

Icons_USB-Drive
QUICK WINS FOR USB DRIVES.

THESE SMALL DEVICES CAN EASILY CREATE HUGE SECURITY ISSUES.

  • Scan USBs and other external devices for viruses and malware
  • Disable auto-run, which allows USB drives to open automatically when they are inserted into a drive
  • Only pre-approved USB drives should be allowed in company devices. Establish policies about the use of personal, unapproved devices being plugged into work devices
  • Keep personal and business USB drives separate
  • Don’t keep sensitive information on unencrypted USB drives. It is a good practice to keep sensitive information off of USB drives altogether
  • Learn More: https://www.us-cert.gov/ncas/tips/ST08-001

 

Icons_www
QUICK WINS FOR WEBSITE SECURITY.

CREATE A SAFE ONLINE SHOPPING EXPERIENCE FOR YOUR CUSTOMERS.

  • Keep software up-to-date
  • Require users to create unique, strong passphrases to access
  • Prevent direct access to upload files to your site
  • Use scan tools to test your site’s security – many are available free of charge
  • Register sites with similar spelling to yours
  • Click here to learn more

 

 

Icons_Wi-Fi
QUICK WINS FOR WI-FI SECURITY.

THINK BEFORE YOU CONNECT.

  • Use separate Wi-Fi for guests or customers than you do for business
  • Physically secure Wi-Fi equipment
  • Use a virtual private network (VPN) when using public Wi-Fi
  • Do not connect to unknown, generic or suspicious Wi-Fi networks. Use your mobile carrier's data plan to connect instead
  • Turn off Wi-Fi and Bluetooth when not in use on your devices
  • Secure your internet connection by using a firewall, encrypt information and hide your Wi- Fi network
  • Click here to learn more 
Subscribe to Network Security News