Page 67 - Cyber Warnings August 2017
P. 67

6.  Employ the most advanced data security practices
                       In addition to paragraph 2, use cybersecurity best tools such as DLP-solutions, antivirus, anti-
                       spam and anti-phishing software and practices such as encryption, network segmentation and
                       multifactor authentication. Correct use of these practices and tools together with Information
                       Governance best practices would greatly facilitate the work of security officers and minimize the
                       risk of data breach.

                   7.  Make insider threats top security concern
                       Insider threats can be intentional when employees deliberately steal valuable confidential
                       information or damage computer networks and unintentional when employees click on suspicious
                       links and bad attachments. And knowing that, companies still have too general insider threat
                       programs and employees just ignore them. Most important decision here is to conduct permanent
                       employee training the main purpose of which is to reduce cyber risk and minimize the impact of
                       cyberattacks.

                   8.  Put into use information resources
                       There is a wealth of information on different resources concerning cybersecurity and its hottest
                       issues. Study these resources and learn up-to-date information of global cybersecurity market.
                       Moreover, always participate in different training programs and sessions conducted in your area.
                       It will broaden your horizons and make useful contacts.

                   9.  Control your company’s devices
                       To protect your confidential information you must manage your endpoints – all the devices of your
                       network that access your data. Control your cloud accounts, portable storage media, IoT devices,
                       laptops, tablets, mobile phones etc. Apart from these devices, you should closely monitor all
                       applications used, data accessed and those employees who have that access. There are also
                       newest solutions for mobile devices management that are aimed at remotely locating, monitoring
                       and deleting valuable data .

                   10.  Don’t think the battle is over
                       The battle between cybersecurity officers and hackers is never-ending.  Thorough forensic
                       investigation of an incident is the issue of paramount importance. Core questions to be addressed
                       in this regard include determining attack vector and what data was compromised; exploring
                       whether all potential threats and vulnerabilities have been locked down and hackers have been
                       neutralized. Moreover, you have to find out who attacked you and why and what other attacks
                       you might have become victim to. It must be made clear that neglecting investigation or its low
                       quality will necessarily lead to huge financial and reputational losses when an attack happens
                       again.

               Cybersecurity culture within an organization can either be weak or strong and it is totally
               dependent on the contributions of all staff members.


               About The Author
                                        Vera Salauyova

                                        PR manager at Falcongaze company with three years of experience in
                                        blogging, copywriting, PR and social networks management. Vera loves to
                                        analyze the market and explore new ways of sharing knowledge and great
                                        experience of my colleagues with the global information security community.
                                        Vera can be reached online at [email protected] and at her
                                        company website https://falcongaze.com/



                    67   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   62   63   64   65   66   67   68   69   70   71   72