Page 67 - Cyber Warnings August 2017
P. 67
6. Employ the most advanced data security practices
In addition to paragraph 2, use cybersecurity best tools such as DLP-solutions, antivirus, anti-
spam and anti-phishing software and practices such as encryption, network segmentation and
multifactor authentication. Correct use of these practices and tools together with Information
Governance best practices would greatly facilitate the work of security officers and minimize the
risk of data breach.
7. Make insider threats top security concern
Insider threats can be intentional when employees deliberately steal valuable confidential
information or damage computer networks and unintentional when employees click on suspicious
links and bad attachments. And knowing that, companies still have too general insider threat
programs and employees just ignore them. Most important decision here is to conduct permanent
employee training the main purpose of which is to reduce cyber risk and minimize the impact of
cyberattacks.
8. Put into use information resources
There is a wealth of information on different resources concerning cybersecurity and its hottest
issues. Study these resources and learn up-to-date information of global cybersecurity market.
Moreover, always participate in different training programs and sessions conducted in your area.
It will broaden your horizons and make useful contacts.
9. Control your company’s devices
To protect your confidential information you must manage your endpoints – all the devices of your
network that access your data. Control your cloud accounts, portable storage media, IoT devices,
laptops, tablets, mobile phones etc. Apart from these devices, you should closely monitor all
applications used, data accessed and those employees who have that access. There are also
newest solutions for mobile devices management that are aimed at remotely locating, monitoring
and deleting valuable data .
10. Don’t think the battle is over
The battle between cybersecurity officers and hackers is never-ending. Thorough forensic
investigation of an incident is the issue of paramount importance. Core questions to be addressed
in this regard include determining attack vector and what data was compromised; exploring
whether all potential threats and vulnerabilities have been locked down and hackers have been
neutralized. Moreover, you have to find out who attacked you and why and what other attacks
you might have become victim to. It must be made clear that neglecting investigation or its low
quality will necessarily lead to huge financial and reputational losses when an attack happens
again.
Cybersecurity culture within an organization can either be weak or strong and it is totally
dependent on the contributions of all staff members.
About The Author
Vera Salauyova
PR manager at Falcongaze company with three years of experience in
blogging, copywriting, PR and social networks management. Vera loves to
analyze the market and explore new ways of sharing knowledge and great
experience of my colleagues with the global information security community.
Vera can be reached online at [email protected] and at her
company website https://falcongaze.com/
67 Cyber Warnings E-Magazine – August 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.