Feb 23 2017

Tactics for Optimizing Cybersecurity in your Organization

cybersecurityAs cloud computing settles further into mainstream IT, cybersecurity and ransomware have become top-of-mind for every business across the industry. TechTarget defines cybersecurity as the body of technologies, process and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Although many organizations are aware of cyber threats that can affect their business and everyday life, many have issues entrusting service providers with their data and frequently neglect cybersecurity practices. According to Pew Research Center, 49% of Americans feel that their personal information is less secure than it was five years ago. The statistics around data breaches in America tell the severity of neglected cybersecurity practices:

  • 41% have encountered fraudulent charges on a credit card.
  • 35% have received notices that some type of sensitive information has been compromised.
  • 16% say that someone has taken over their email accounts.
  • 13% say that someone has taken over their social media accounts.
  • 15% have received notices that their social security number has been compromised.
  • 14% say that someone has attempted to take out loans or lines of credit in their name.
  • 6% say that someone has impersonated them in order to file fraudulent tax returns.
    • Pew Research Center

One of the main reasons cybersecurity weighs heavily on the mind of business owners is the rapid rise of ransomware attacks. In 2016, more than a billion dollars in ransom was paid and global attacks doubled in the second half of the year. Ransomware continues to generate significant revenues for attackers as organizations continue to struggle with a way to effectively counteract the threat. Whether it is having the wrong defense in place or a poorly educated staff, cybersecurity and the battle against ransomware requires a change of culture from everyone in the organization. Below are some tactics for optimizing cybersecurity across your organization.

  • Employee Training
    Employees are the first line of security against a threat and can oftentimes be unknowingly manipulated into divulging confidential information. Employee awareness and education are essential in addition to strong password management, monitoring services and a clearly defined set of permissions.
  • Two-Factor Authentication
    By requiring a second form of authentication, organizations protect against sophisticated attacks.
  • Disaster Recovery / Business Continuity Planning
    A strong disaster recovery solution can help address vulnerabilities and ensure that mission-critical data is available in a coordinated and timely manner. To learn more about Disaster Recovery, click HERE.
  • Preparation
    Many organizations have the “it will never happen to me” mentality, preventing them from taking cybersecurity as seriously as they should. To a hacker, everyone’s information is valuable and they prey on the most gullible victims. By going into cybersecurity with the expectation to be compromised, you will properly protect your most valuable data.
  • Asset Protection
    Taking inventory of your assets allows your company to know what resources are online and where they might be most vulnerable. Using secure office hardware, keeping spies out of emails and encrypting your website can help mitigate attacks

To learn more about Data Security, http://www.keycloud.com/security/.

 

Author: Drew W.
Key Information Systems