Page 66 - Cyber Warnings August 2017
P. 66

CYBERSECURTY CULTURE IN YOUR BUSINESS: 10 STEPS TO

               CREATE IT

               By Vera Salauyova, PR manager at Falcongaze company

               The number of cyber attacks is growing rapidly and headlines these days are all about more
               and more sophisticated data security threats. Cybersecurity incidents always result in huge
               financial and jobs losses, reputational damage as well as civil litigation.

               Take a look at the statistics of Kaspersky Labs: 90% of companies have already experienced
               data breach with an average cost per incident of $3.6million. The Ponemon institute adds that
               27.7% of businesses surveyed will likely suffer one more breach in the next two years. Despite
               these frightening numbers, companies still neglect basic cybersecurity rules and leave their
               systems and confidential information extremely vulnerable.

               Indeed, in the present situation it is impossible to stop hackers but there is a mixed approach to
               data security which combines data management, principles of information security and
               information governance. This approach will help to create cybersecurity culture in your business
               and it consists of ten key steps to take:


                   1.  Never cheap out on technologies and training
                       First, train your employees constantly, deploy DLP software and establish business processes
                       and subprocesses properly. This will help you to avoid huge financial losses connected with
                       incident response and remediation. It will also reduce the fine imposed on your company, costs of
                       lawsuits and soften reputational damage. Never conceal the fact of a breach and immediately
                       report it to the authorities. Act decisively and coherently because inaction only increases damage
                       after data loss.

                   2.  Examine and use Information Governance best practices
                       Compliance, Governance and Oversight Counsel together with Information Governance
                       reference Model Guide have recently developed Information Governance best practices. To
                       completely protect your data, study these practices; identify your data, its value, location and
                       users with access to it. Then protect only really valuable information in your organization and
                       delete data that you don’t need.

                   3.  Don’t live by compliance alone
                       Meeting compliance requirements is essential in cybersecurity but compliance-only mentality is
                       totally ineffective in modern constantly changing cyber threat environment. It won’t reduce the risk
                       of cyberattack and help to improve incident response.

                   4.  Call on all possible resources
                       Not only top management and chief information security officers are responsible for quick incident
                       response. Engage all the members of your staff: human resources, communications, information
                       technology and security teams. Working together is therefore a core factor of success.

                   5.  Be aware of third-party threats
                       Any business consists of a chain of technologically independent computer users so any computer
                       of this chain can be used to exploit others to which it connects. Any contract you sign with third-
                       parties must include rights, obligations and possible penalties related to using, spreading and
                       securing sensitive information. Collaboration in attack response must also be governed by legal
                       principles.
                    66   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   61   62   63   64   65   66   67   68   69   70   71