Heres what they had to say:
1.
Encrypt data and install a web connection firewall
40% off TNW Conference!
Hackers dont just target the companys financial data.

Any kind of customer, as well as employee data, may be targeted via phishing attacks.
Data encryption is necessary to protect data from hacking attempts that manage to surpass the firewalls.
Rahul Varshneya,Benchpoint
2.
Create a positive security culture
Some employees are naturally fearful to present threats or concerns to IT personnel.
Stephen Hetzel,BidPrime
3.
When a developer finds a mistake, they fix it and release an update.
Businesses that dont implement the updates are vulnerable.
Vik Patel,Future Hosting
4.
Use website blockers
Website blockers restrict users from visiting websites that may expose you to phishing and hacking attacks.
It also allows you to restrict any other site of your choosing.
There are a host of free and paid versions to choose from as well.
Matthew Podolsky,Florida Law Advisers, P.A.
Enable two-factor authentication
Having your team use two-factor authentication will help to keep some hackers at bay.
Nicole Munoz,Nicole Munoz Consulting
6.
We create unique passwords for everything and also change them every 30 days.
It can be a bit exhausting, but its something I feel is a must-do.
We also dont store them on any file-sharing cloud sites to further protect them.
So far the approach has worked.
Jonathan Long,Uber Brands
7.
Use a password manager
Password managers are essential, especially when you have multiple accounts across systems.
David Boehl,GraphicBomb
8.
Talk about the worst-case scenarios
Everyone knows computer security is important but nobody takes it seriously.
Post security articles on team bulletins frequently.
Matt Wilson,Under30Experiences
9.
Train your employees to be vigilant
One of the most common methods hackers use is email.
Also, encourage them to alert others when one comes in.
Ismael Wrixen,FE International
10.
We remove wide-ranging access once a project ends.
Ryan D Matzner,Fueled
11.
Limit access
Youd be surprised at how many hacking attacks were simply the result of clever social engineering.
If you have fewer links in the information chain, there are fewer potentially exploitable weak points.
Bryce Welker,Crush The CPA Exam
12.
Justin Cooke,Empire Flippers
13.
Get cybersecurity insurance
It is hard to prevent a cyber attack by a skilled, highly motivated hacker.
Learn more at yec.co.