Cybersecurity Initiative

The Cybersecurity Initiative

In Uncategorized by Jeff Pelliccio

Winning the cybersecurity battle continues to be today’s most difficult technological challenge affecting everyone from large-scale corporate businesses to small entrepreneurial start-ups to even protecting our children online. Hackers and criminals don’t sleep. Maybe they work in shifts, either way, how can a typical nine to five, fill in the blank business, open Monday through Friday, expect to keep up with the demands of cyber-security when the threat doesn’t sleep, eat, drink or take the kids to soccer practice?

Besides constantly installing updates and following the latest data breach hoping your name or your company’s name doesn’t end up on the ten o’clock news, here are a few steps your business can do to avoid becoming another statistic.

Employee Cyber Security Education

The lack of employee education continues to be the number one insider threat facing companies. It has become essential to bring security awareness to employees in the form of specific security training and best practices but more importantly emphasizing how important their lack of awareness can put the entire company in jeopardy. Unfortunately trying to keep them awake through that company-sponsored luncheon you just paid for is another article for another day. Learning how to identify a suspicious email with a special link; identifying a strange unsolicited “friend” or “follow me” request; and my favorite that surprisingly still works, providing your personal information, passwords, or account information via email reply or over the phone.  And don’t forget regularly required password changes, never using the same password for multiple systems and equally important the use of a strong password (not found in the dictionary) that incorporates length, letters, numbers, and special characters.

Hire In-house Cybersecurity Talent

Hiring a security professional to take care of the cybersecurity headache for you? Unless you have a detailed and clear understanding of your assets, user activity and basic IT infrastructure, all the security in the world is pointless without data classification and assigning policies such as least privilege user identity, multi-factor authentication, and cloud security access.

Identify your top threats and understand which business areas have a shortage of cybersecurity resources. Do you have the resources to respond to an incident as well as identifying and preventing the intrusion?  What does your current vulnerability management look like? Are you able to run regular vulnerability assessments to determine application integrity? When an anomaly occurs is there a process for remediation? If I may paraphrase the famous words of Abraham Lincoln, “You can prevent some of the threats all the time and all the threats some of the time, but you can’t prevent all threats all the time.” I think you get the point.

Use The Most Current Technology

Employ block-chaining technology as well as compartmentalizing your data by utilizing a secure modularization platform.  Providing multiple layers of security such as identity verification and off-site storage of sensitive data will discourage hackers and prevent them from getting all or your data (or your client’s data) such as emails and credit card information.

In closing, whether implementing your own cybersecurity policies or contracting out the headache of security training and implementation, remember you don’t know what you don’t know. Education and awareness is everyone’s responsibility. Whether a non-technical home user, a senior network admin, CEO or board of directors, cybercriminals are not concerned who or where the weak point is, but rest assured they will find it.