Phone: 303-887-5864

Email: info@huttanholdingllc.com


The Security Seven: Your Week One Action Plan


Elevate your cybersecurity in just one week with these detailed daily actions!

Day 1: Enable Multi-Factor Authentication (MFA)

Secure all your professional accounts with an extra layer of protection.

  • Set up MFA on your email accounts (e.g., Gmail, Outlook)
  • Enable MFA for cloud storage services (e.g., Dropbox, Google Drive)
  • Activate MFA on social media accounts used for business (e.g., LinkedIn, Twitter)

Day 2: Update Passwords

Create unique, complex combinations for each of your accounts.

  • Use a password manager (e.g., LastPass, 1Password) to generate and store strong passwords
  • Aim for passwords with at least 12 characters, including uppercase, lowercase, numbers, and symbols
  • Change passwords for critical accounts (banking, email, client portals)

Day 3: Secure Your Home Office Wi-Fi

Review and enhance the security of your home network.

  • Change default router login credentials
  • Enable WPA3 encryption (or WPA2 if WPA3 is unavailable)
  • Set up a guest network for non-work devices
  • Keep your router’s firmware updated

Day 4: Encrypt Client Data

Ensure all devices containing sensitive client information are properly encrypted.

  • Enable full-disk encryption on your computer (e.g., FileVault for Mac, BitLocker for Windows)
  • Use encrypted cloud storage services for sensitive documents
  • Encrypt USB drives and external hard drives that contain client data

Day 5: Update Engagement Letters

Revise your documents to address current cybersecurity practices.

  • Include clauses on data protection and confidentiality
  • Specify your firm’s cybersecurity measures
  • Outline client responsibilities in maintaining data security
  • Address procedures for secure file sharing and communication

Day 6: Enhance Data Disposal

Review and improve your procedures for securely disposing of client data.

  • Implement a clear data retention and deletion policy
  • Use secure file deletion software for digital files (e.g., CCleaner, Eraser)
  • Properly dispose of physical documents using a cross-cut shredder
  • Consider hiring a professional data destruction service for large-scale disposal

Day 7: Schedule a Professional Assessment

Book a comprehensive cybersecurity review with an IT expert.

  • Research and select a reputable cybersecurity firm
  • Prepare a list of your current security measures and concerns
  • Schedule both an initial assessment and regular follow-ups
  • Consider penetration testing to identify vulnerabilities


Remember: Cybersecurity is an ongoing process. Stay vigilant and keep your defenses up-to-date!

Need help implementing these steps? Don’t hesitate to reach out to a cybersecurity professional.