I previously mentioned that I would share an update on how we’re protecting ourselves from a cybersecurity standpoint, hoping it could benefit others as well.
In this episode, I shared 10 steps we’re taking to enhance our protection from security threats.
Listen below.
1:04 The first step we took was hiring a cybersecurity firm to assess our current situation and provide a detailed report on our vulnerabilities and risks.
1:37 Second, we invested in dedicated work hardware for our distributed team. Previously, they were using personal devices, but we were advised to separate work and personal equipment.
1:47 Third, we brought in another third-party provider to set up endpoint security on our devices to protect against malware and hacking attempts.
2:09 The fourth step is we’re working with the same third party to provide ongoing cybersecurity training for our team.
2:35 Fifth, we ensure the use of strong passwords and store them securely in LastPass, a password manager, for our entire team.
2:48 For the sixth step, we enforce two-factor authentication on all our most sensitive applications.
2:55 Seventh, we use SpinOne to automate daily backups of our Google accounts, ensuring data is protected in case of loss.
3:14 The eighth step is we encourage using TunnelBear VPN for team members connecting to public Wi-Fi networks.
3:29 Ninth, the report from our original third party helped us develop security policies, which we then communicated to our team for data sharing internally and with third parties.
3:51 Lastly, thanks to the initial cybersecurity report, we engaged additional third parties to address the technical threats identified.