Businesses stand to lose more than 100 billion per year to cyberattacks and fraud globally mdash and surveys show itrsquos a top concern for your clients customers and contractors

Businesses stand to lose more than $100 billion per year to cyber-attacks and fraud globally — and surveys show it’s a top concern for your clients, customers, and contractors.

9 Steps That Will Lockdown Cyber Security

You must apply the same creativity and organizational energy you apply to meeting customers’ expectations for quality and service Engage and educate Secure your networks, cloud Fine-tune mobility

“Dear Client,” … That’s how the letter usually begins.  The next few sentences are a little trickier; there is really no good way for someone to hear that their data has been stolen.  Unfortunately, getting that letter is becoming an increasingly common occurrence in business. As things stand now, organizations stand to lose more than $100 billion per year to cyber-attacks and fraud globally.   

While a security breach might be one of the last things on your mind, the most recent Travelers Risk Index report shows that it’s a top concern for your clients, customers, and contractors: “Personal Privacy Loss and Identity Theft” went from barely ranking in that annual survey a few years ago to the No. 2 spot now, right behind “Financial Security.” 

The expectation of cyber security has to be met with the same fervor, creativity, and drive that business people muster to meet their clients’ and customers’ expectations.   To get started, review these steps.

1. Engage and educate your employees — It’s important that you create a culture of security within your organization because security is everyone’s responsibility. If you don’t have buy-in from all your team members, you’re exposing your business to unnecessary risk.

Most cyber-attackers gain access to networks via social engineering and the manipulation of a user within an organization, not via command line “hacking” from a dark, pathetic basement somewhere, as movies and television often portray such characters.  Why would someone spend days trying to crack your accountant’s password when they can simply call your IT desk pretending to be your accountant, and ask the tech on-call that day to reset it to something new? 

2. Anti-virus — Having an up to date anti-virus deployed on all of your desktops and servers is vital to organizational cyber security. An unprotected computer is an easy target for a motivated attacker. Don’t make it easy on them – pay for anti-virus and make sure it’s regularly updated by your IT staff.

3. Password management — It’s important that you and your employees leverage strong, complicated passwords that are not easy to guess. Today there are hacking applications that can be plugged into a computer, and in about four minutes will run through the most common 10,000 passwords used, trying each of them. You’d be surprised how many folks with access to critical data have the password of “password,” or if they are feeling clever, “password1” (Did this just reveal your password?  Go change it. Now.). 

4. Secure your networks — Without getting too technical, just know that having a firewall between your corporate network and the Internet is very important. If you don’t have that barrier, there is very little stopping someone from freely accessing your data. 

5. Secure your cloud — No matter what cloud provider or service you use, make sure you do a complete review and analysis of their security practices. If they can’t easily and quickly tell you how your data is secured, odds are it isn’t secure. Also, for any accounts used to access your firm’s data, make sure you have strong passwords and only access it via a computer you own or trust.  If you access your cloud on an infected machine, there is a real potential for a hacker to learn your password and use it later on without your knowledge.

6. Protect your banking information — Make sure that all financial data, accounts, and records are kept secure and segregated from the rest of your business’ general shared drives. If financial transactions are conducted electronically, ensure they are done over an encrypted connection and that your employees never email account numbers, credit card information, or sensitive financial documents.

7. Backups — One of the most common types of breaches now being seen are called “ransomware” attacks.  Instead of “stealing” data from your organization, these attackers find your critical data and then encrypt it (digitally locking you out of it), making it so that only the person with the digital “key” can unlock and access that data. Then, the hackers offer the victim access to the “key” for a very large fee.

If you or your organization is hit with one of these ransomware attacks, you have two options: Pay the fee or restore the locked data from a recent backup. This is why backups are so important. Recently a very large hospital, a police department, and a public school (along with literally thousands of other victims) have been forced to pay tens of thousands of dollars to regain control of their data. 

Making sure your data is backed up and stored separately from your main repository can help protect you from attacks such as these. 

8. Physical security — This detail is self-explanatory but you’d be surprised how much client data is left lying around the office. Ensure your partners, trusted employees, and finance team lock away any sensitive documents when they aren’t working with them. 

9. Mobile devices — While these are a convenience for you and your staff, and will increase productivity, mobile devices mean that your clients’ sensitive data can walk out your firm’s door without you ever knowing it. Make sure that all mobile devices used to access corporate data have passwords (your email server can force this requirement), and if you have employees that use laptops you should look at having the hard drives for those machines encrypted. Most modern operating systems have encryption built in to them (you just have to enable the feature), and it’s foolish not to leverage it. If an employee accidently leaves a laptop on a plane or in the back of a taxi, you’ll be guaranteed that all data on it is secure and protected.  

Your business, your brand, and your bottom line depend on the trust you develop with your customers. Handling the items listed above will go a long way in protecting all three.

Clinton Henry is a cyber-security and identify-theft expert, in demand by business and IT executives seeking guidance on protecting their corporate profits and reputation from attack or compromise.  Contact him at 650-636-7890, or [email protected]; or visit www.ClintonHenry.com.   

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish