Employers must evaluate their first aid needs based on the needs of their workplace and employees. There are many First Aid Kits available online that you can purchase.
An example of contents should include:
Building an emergency action plan see link to www.ready.gov/business/implementation/emergency
Security awareness involves knowing the threats your network faces and the risks they pose. Usually, your end users or employees are the weakest link and the most likely area where a virus can be introduced.
Providing training in cyber security is a major step in preventing an attack.
Bad actors will look for the easiest way to access your system which is usually through the internet.
Phishing, a type of social engineering, that uses tactics to trick the user into clicking on a link containing malware which would pass to your main server giving the bad actor access. The bad actor may also try and extract information such as usernames, passwords, email address or money through made up stores.
An example would be an email from an executive of the company requesting to immediately wire money to a specified account. The recipient does not release the email address was slightly altered and believe they are talking to the executive. Another example might include an email indicating that your customers bank account has changed and to make your next payment to the new bank account.
By training your staff, they will be more aware of these types of deceptions reducing the chance that they will be fooled. There are several types of social engineering that users fall prey to. When building your security plan, the most common ones should be outlined with examples for your employees.
An Example of a letter you might send to your employees
Two factory identification gives you an additional level of security. An example would be, in addition to your username and password, you might be prompted to add a personal phone number of zip code.
If you want a more secure two factor identification you can get rotating 6 digit numbers that will display on your cell phone that change every minute and is tied this to your system, making it very difficult for a bad actor to break in by stealing a password.
University of California -Merced
If mail or package a package is suspicious: