2 . Follow all the usual cybersecurity best practices . That means ensuring you have a firewall ( used to create a buffer zone between your network and external networks ) in place to block out any insecure or unnecessary websites and services , along with malware protection to block malicious emails and prevent malware being downloaded from websites . The good news is that most popular operating systems now include a malware protection and a firewall , so it may simply be a case of switching this on or updating it . Alongside this , enforcing a strong password policy is one of the most effective ways of preventing brute force hacking attempts . You could also consider enforcing multi-factor authentication for every authorised user , and institute leastprivilege security . Nobody needs full access to everything , and should one account become compromised it can help contain the damage . Equal focus should be given
30