Page 64 - Cyber Defense eMagazine - November 2017
P. 64

Active defense techniques is an area that has developed in the network security world. Active
               defense techniques can embed programs in the data that will attack the hacker's computer if
               data is stolen. These techniques can have legal issues and would need approval from a CEO
               before being used.


               HAVE A DATA RECOVERY AND EMERGENCY RESPONSE PLAN

               It can take only hours for your company's reputation to be damaged by a security breach.

               A  security  breach  can  create  both  financial,  and  legal  issues  for  your  company.  When  your
               business becomes a victim, you need to know how to respond to minimize the damage.  Some
               companies  minimize  risks  by  transferring  liability  to  a  third  party.  Securing  data  on  a  cloud
               service cuts costs, and increase flexibility.

               Cloud providers maintain security to protect their clients' data and function as a data backup.
               Security  risk  can  also  be  transferred  to  the  provider,  or  cyber  liability  insurance  can  be
               purchased by your company.      If a breach occurs, react quickly. Identify when and where the
               breach occurred. You should work with your security team to gather information. This will help
               you figure out if any information is stolen so that you have a complete picture of the situation.
               Staying on top of the issue will minimize the damage so that you can work on recovery as soon
               as possible.

               Conclusion

               As the CEO, you have a vital role in promoting cybersecurity awareness.

               Having the right cybersecurity culture can help with protecting your company's valuable data..
               These nine methods will contribute to strengthening your organization's cybersecurity.



               About the Author:


               Jessica  Anderson  is  a  cybersecurity  enthusiast and  writer  who  studied  journalism  at  Rhodes
               University. She is working as Director of Public Relations in Phoenix NAP LLC. Jessica can be
               reached     online   at   [email protected]       and     her   company      website
               https://phoenixnap.com/














                   64    Cyber Defense eMagazine – November 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   59   60   61   62   63   64   65   66   67   68   69