Flex Protection Logo

Streamlined Cybersecurity education, planning, assessment, monitoring, and testing



10 Measures To Help Prevent a Cyber Attack

Threats are growing - here's how you strengthen your defenses



The List Updated for 2021


  1. Create a Written Information Security Policy
  2. Conduct a High-Level Assessment with a Trusted Partner
  3. Semi-annual User Security Awareness Training (SAT)
  4. Create an Inventory of All Your Data Stores
  5. Take the Five Easiest Security Steps
  6. Implement the Seven Best Security Practices
  7. Adopt Risk Assistant and Flexible Risk Management
  8. Utilize a Database of Known Cyber Risks
  9. Evaluate and Apply a Set of Basic Defensive Measures
  10. Explore and Consider Automated Security Tools









Details: The Top 10 Defensive Measures You Should Have Working For You


Security Measure Get Started
Create a Written Information Security Policy
(At a minimum, include an Incident Response Plan, Password Policies, and User Training scope. Start with our Information Security Policy outline.)
Enroll In Free Basic Defender
Conduct a High-Level Assessment With a Trusted Partner
(Find danger spots and opportunities for improvement without disrupting your business. Start with our Discovery Questionnaires and Tech Scan)
Enroll In Free Basic Defender
Semi-Annual User Security Awareness Training (SAT)
(Custom training tailored to your company reduces the chances of a successful attack or security breach)
Schedule With Us
Create an Inventory of All Your Data Stores
(Use a formatted inventory sheet, include locations, how data is protected, who is responsible, where backups are stored, value of data)
Enroll In Free Basic Defender
Take the Five Easiest Security Steps
(Simple, economical steps you can take to reduce your risk and avoid cyber attacks. Includes policy and training development.)
Enroll In Free Basic Defender
Implement the Seven Best Security Practices
(Basic steps and practices that will go a long way toward protecting your critical systems and data)
Enroll In Free Basic Defender
Adopt Risk Assistant and Flexible Risk Management
(Utilize an industry standard set of cyber risks, work with basic effective counter-measures)
Risk Assistant Summary
(Included in Enterprise Defender)
Utilize a Database of Known Cyber Risks
(Build on list included in Risk Assistant, add threats from other sources as needed. Your risks may be categorized as technical, physical, or administrative.)
See Risk Assistant Prototype
(Included in Enterprise Defender)
Evaluate and Apply a Set of Basic Defensive Measures
(Pull from Risk Assistant and other sources, apply to threats to reduce overall risk score)
See Risk Assistant Prototype
(Included in Enterprise Defender)
Explore and Consider Automated Security Tools
(Deploying a SIEM application, using vulnerability scanning tools like Nessus, adopting the NIST framework, conducting penetration test exercises. Start with our brief Security Technology Overview.)
Enroll In Enterprise Defender Below





Four Easy Steps You Can Take Today


  1. Teach users to use actual words in their passwords. Which is easier to remember, "DancingShirt250" or "JxQ2$e#wQ9Kh" ?
  2. Create a bare-bones, minimalist Incident Response Plan. Just jot down the names, email addresses, and phone numbers for the people who need to be contacted when there is a cyber incident or breach. And post it where people can see it.
  3. Identify the crown jewels. Make a list of the information and documents your company just can't operate without. And make sure these items are being backed up frequently and automatically.
  4. Enroll in the flexible Defender program above.




Security steps - security planning.


View a real-time global threat map













What You Can Do Now







Security Managers and security staff completing a good course.




Our Partners: Related Services You May Need


Cyber Insurance
Cyber Insurance helps cover the costs associated with cyber attacks and data breaches. However, many Cyber policies don’t cover Ransomware demands, Denial of Service attacks, and regulatory fines resulting from a breach. Companies concerned about the rising threats of cyber crime need to be careful when selecting a Cyber Insurance provider. A lack of standardization makes the choice even more difficult.
We don't sell Cyber insurance. But our friends at Embroker offer excellent Cyber Insurance policies and a web site full of important information on the topic.

Pleae visit Embroker.com to learn more.
Network Monitoring
A remote network monitoring service would include Intrusion Detection Software (IDS) or Intrusion Prevention Software (IPS) that notifies the monitoring company of an incident. It may be a cyber attack or an anomaly that warrants attention. Network monitoring would include a Help Desk and a NOC that operates on a 24-hour basis.
We don't offer a network monitoring service. But we do have the ability to discuss your network applications and technology, and to help you decide what kind of solution is the best match for your budget and operations.

Let Us Assist You
Advanced Technical and Cybersecurity Training
Online and in-person training is available on a wide range of technical topics, often related to information security. Many available courses are intended for IT professionals, and prepare learners for industry certifications such as "Certified Ethical Hacker". Other courses are aimed at end users and managers, and cover a wide array of topics, typically less technical than the IT certification courses.
We offer end-user "Security Awareness Training" - valuable online courses designed to prevent your users from making a mistake that could be costly. We do not offer the highly-technical training intended to prepare learners for an industry certification in data security. However, our partners at Global Knowledge offer an array of high-quality education on many technical subjects. They deliver in-person and online training for companies of all sizes.

Please visit GlobalKnowledge.com to see their vast catalog.







Flex Protection Logo


Copyright 2021 National Training Systems 16586 N Dale Mabry Hwy. Tampa FL 33618  --  Training provided by FlexTraining