“… Use strong passwords and consider 2FA to make it harder for crooks to gather intelligence … Consider a “back to base” VPN for remote users so their online security is kept up, even on the road. Think twice about publicly posting personnel information that could be abused in phishing attacks. …”