Data breaches and other cyber crime cost companies billions each year worldwide, and the damage to brand reputation can be incalculable. Since hackers look for weakly defended systems to attack, this paper presents 5 cybersecurity “best practices” to mitigate system vulnerabilities. Some are commonsense measures like effective password management; others involve securing open ports and other access points, software upgrades, user management, and vulnerability plans.