LinkedIn twitter google+ facebook Pinterest

Cybersecurity: how prepared are you?

Cybersecurity: how prepared are you?

We realize this reference will be dating this post. Only a couple days ago, mega financial services company Capital One had a major cybersecurity incident directly affecting 100 million Americans. Specifically, a hacker accessed their customers’ private financial data. Scary stuff.

Securing data in this day and age has become quite costly for corporations of all sizes. Worldwide cybercrime costs are estimated to exceed $600 billion USD a year according to the Internet Society.

How can organizations safeguard their data? Information is power. Every organization should establish data security policies. The following insight may help as you begin crafting yours:

1) Malware and Ransomware
Hackers love malware and ransomware. It’s an easy way to shut down servers. Then the hacker demands a ransom to restore the information. There are several ways a person could end up with malware on a device. The danger is that once it’s on one device, it can easily target the rest of the company. The most common ways of “contracting” worms on a computer are through software downloads that include some extra free downloads, file sharing, removable media, shareware without the aid of internet security software programs, etc.

Preventing hacks of this type is simple. Invest in some security for your systems and ensure employees do not click on pop-up ads or download anything not authorized.

2) Phishing attacks

I fell for this once. Luckily my MacBook Pro protected me at the time! Phishing is a common way for hackers to gain access to your data. You’ve probably seen the email before. It comes from “Google” or “Facebook” and says that for one reason or another you need to log back into your account to verify your information. The emails look legitimate and many people fall victim to these attacks.

Phishing emails work because they appear realistic. Sometimes the email even routes the victim to the real page which is infected with a script that monitors digital movements.

An easy way to prevent this issue is to either go directly to the website you received an email about without clicking on a graphic, letterhead, etc., from the email.

3) Employees

We’re all human. We make mistakes. Human error is a key factor in many cybersecurity attacks. Weak passwords, unencrypted devices, clicking on phishing emails and other failures in security compliance can leave the company in a tough spot that can cost millions.

Creating policies that safeguard the company’s data is no longer a luxury, but is imperative. Spending time training your employees on proper security measures is an initial investment that could save the company millions in the future.

4) Cloud threats

Everyone loves the cloud. Cloud-based systems allow information to be readily available and more fluidly shared. Without proper encryption or security, this is a hotspot for an attack.

When it comes to cloud-based software, some of the top threats are not just in the elusive cloud realm. Your organization also needs to be wary of access to credentials, account hijacking, data loss, advanced persistent threats (which is a series of attacks over a longer time frame), denial of service and Spectre and Meltdown. These various cloud-based attacks can come at your organization from all angles and it is important that your company be prepared for the myriad of types. Employing a cloud security specialist can help alleviate a company’s vulnerability. Optomi has a pool of elite talent qualified for the task. Just reach out to us at info@optomi.com to discuss options.

A little due diligence goes a long way in cybersecurity.

Cyber/Data Security experts are some of the most in-demand talent of our time. Attracting them requires a firm that understands the challenges# and utilizes unique recruiting methodologies for a spectrum of IT security projects. Explore our services at www.optomi.com.