Cybersecurity Checklist: 8 4 4 - 4 4 - J M A R K
Cybersecurity Checklist: 8 4 4 - 4 4 - J M A R K
Cybersecurity Checklist: 8 4 4 - 4 4 - J M A R K
C O M // 8 4 4 - 4 4 - J M A R K
YOUR
CYBERSECURITY
CHECKLIST
Technology has transformed the way we all do business for the better. However, to
keep your data and business from being at risk, you must ensure your tech is
secure and continuously monitored. We’re providing this detailed checklist as a
reference tool to help you verify that adequate cybersecurity and physical security
policies are in place throughout your organization.
CYBERSECURITY CHECKLIST 2 JMARK.COM
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 3 JMARK.COM
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 4 JMARK.COM
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 5 JMARK.COM
When assessing the impact, consider the value of the assets that are at risk, what it will cost to replace them, and their
importance. The things that affect likelihood include threat capability, frequency of occurrence, and the effectiveness of the
countermeasures available to you.
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 6 JMARK.COM
• The effect is minor. Most operations are not affected. • Not likely to occur more than once a year.
• Your operations shut down for a period of time, resulting in • This is likely to occur once a year.
financial loss. Customer confidence is slightly affected.
• You experience a loss of operations resulting in a significant • This is likely to occur once a month.
impact on public/customer confidence.
• The effects are devastating. Systems shut down for • This is likely to occur each week.
extended periods of time. Systems must be rebuilt and data
must be replaced.
• The effect is ruinous. Critical systems go offline for • This is likely to occur on a daily basis.
extended periods of time. Data gets lost or is corrupted
beyond repair. The health and safety of employees is
affected.
PEOPLE DESCRIPTION
Stakeholders Employees, owners, stock holders, etc.
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 7 JMARK.COM
Use the following to assess your risk level for each threat/vulnerability.
SCORE RISK LEVEL RISK RESULT
21-30 High Risk • Major loss of assets, data, or information resources.
• Completely disrupts operations for a week or more.
• Destroys your reputation.
11-20 Medium Risk • Substantial loss of assets, data, or information resources.
• Disrupts operations for a few days. Damages your reputation.
1-10 Low Risk • There is a minor loss of assets or information resources.
• Slightly affects the organization’s operation (for less than one day).
Minor loss to reputation.
Corruption
• Fraud, theft, sellling of conficential information.
Abuse of Trust
• Long-term or high-level employees take advantage of relaxed
security policies.
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 8 JMARK.COM
• Password hacking.
• External access to password files, and packet sniffers to access data.
• Extenal attack programs gain unauthorized access to the network
(backdoors).
• Internal attack programs gain unauthorized access to the network.
• The existence of unsecured maintenance modes via developer
backdoors.
• Modems that open an uncontrollable extension of the internal
network.
• Bugs in network software that leave security holes.
• Unauthorized physical access to your system.
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 9 JMARK.COM
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .
CYBERSECURITY CHECKLIST 10 JMARK.COM
REMEDIATION ACTIVITIES
After assessing, reviewing, and rating potential threats and vulnerabilities, you should determine what actions you can take to
reduce your risk. This means employing security controls, and/or increasing the strength of existing controls. Always balance
the cost of doing this against the expected security benefit and risk reduction. Most remediation efforts and actions focus on
the high-risk threats and vulnerabilites first.
The following table lists remediation activities you can take. They are prioritized based on their effectiveness.
As you can see, securing your organization’s technology is a complex task. Yet with the help
of an expert I.T. partner, you can rest assured your company is safe. For more information,
contact JMARK Business Solutions at 844-44-JMARK or email [email protected]. Our team
has the knowledge and skill to secure your business and keep your company safe.
J M A R K . C O M // 8 4 4 - 4 4 - J M A R K // M I S S O U R I // O K L A H O M A // A R K A N S A S
P E O P L E F I R S T. T E C H N O L O G Y S E C O N D .