Please do not leave this page until complete. This can take a few moments.
When I started in security over 20 years ago it was rare that any company would bring up the idea of protecting itself from a cyberattack. Any investment made in security was mainly focused on protecting an organization's physical property and products from theft and destruction. Even today, it is rare to enter a building that does not have an alarm system with 24/7 monitoring, cameras and card access control.
Yet, security needs have shifted, and today companies must not only protect their physical assets but also their digital ones. Recent research has shown that the average loss in a business burglary is around $10,000 compared to a cyberattack, which comes in at a staggering $200,000.
There’s been a notable shift in cyberattacks with cyber criminals now focusing on non-enterprise businesses, or smaller businesses. This is forcing small and midsize organizations to invest in cybersecurity protection to protect digital assets — much like they have with their buildings.
There are some cost-effective strategies that can be put in place that aren’t all that far from what most businesses are doing to protect their buildings.
Here are three ways to get started with cybersecurity:
When you close your business up for the day you make sure the doors are locked and that there is no way for someone to get in. With your digital systems you need to do the same thing. Companies today can check for holes in their digital systems by activating a tool called a vulnerability scanner. It scours inside networks and also from the internet side looking for any gaps and vulnerabilities that cyber-attackers might try to take advantage of. These tools will report weaknesses discovered in your systems and provide detailed recommendations for repair.
Beyond these scanners, organizations can also conduct ethical hacking, also known as penetration testing. Ethical hacking is when a good hacker is hired to try and break into a company’s systems just like cyber criminals might. Their reports include recommended ways to tighten things up and upon completion you will understand if you have left the front entrance or back door open.
Break-in specialists don’t work 9 to 5, they operate around the clock and across time zones. Their intrusion attempts are often well thought out and orchestrated with precision. To protect against a building break-in, businesses install alarm systems that send signals to a monitoring station so that officers will respond, even when the business owner is asleep. Small and midsize companies can now have breach-detection and response systems installed that are watched 24 hours a day by a monitoring station staffed with cybersecurity experts. If a cyber intrusion is detected, these experts respond, contain the break-in and remove the intruder from your systems. Previously these types of solutions were only available to enterprise organizations, but now they are cost effective for non-enterprise companies. Knowing that there are professionals there to respond to a cyber intrusion can help a business operator sleep better at night.
When the fire alarm goes off at your building, your company is ready and knows how to escape the facility because they have been through numerous fire drills and training. You should do the same digitally and train your employees on how to identify and respond to a cyber-attack. There are a number of employee cybersecurity awareness training tools, including educational videos that can educate your team about the types of scams attackers use. An estimated 90% of cyber-attacks involve a phishing email being sent to an employee. To train employees, organizations can use a phishing simulator that sends emails that look like real ones. If the employee interacts with the email incorrectly it will spot train them on what to do next.
Traditional security for your company’s office is important, but with most organizations running remote teams and work from home models, an investment in protecting your digital systems and assets is a key place to focus now. Cybercrime is not going away, so it is no better time than now to invest in protecting your extremely valuable digital systems.
Rob Simopoulos is the co-founder of Portland-based Defendify, an all-in-one cybersecurity platform. He can be reached at rsimopoulos@defendify.io.
The Giving Guide helps nonprofits have the opportunity to showcase and differentiate their organizations so that businesses better understand how they can contribute to a nonprofit’s mission and work.
Learn MoreWork for ME is a workforce development tool to help Maine’s employers target Maine’s emerging workforce. Work for ME highlights each industry, its impact on Maine’s economy, the jobs available to entry-level workers, the training and education needed to get a career started.
Learn MoreFew people are adequately prepared for all the tasks involved in planning and providing care for aging family members. SeniorSmart provides an essential road map for navigating the process. This resource guide explores the myriad of care options and offers essential information on topics ranging from self-care to legal and financial preparedness.
Learn moreThe Giving Guide helps nonprofits have the opportunity to showcase and differentiate their organizations so that businesses better understand how they can contribute to a nonprofit’s mission and work.
Work for ME is a workforce development tool to help Maine’s employers target Maine’s emerging workforce. Work for ME highlights each industry, its impact on Maine’s economy, the jobs available to entry-level workers, the training and education needed to get a career started.
Few people are adequately prepared for all the tasks involved in planning and providing care for aging family members. SeniorSmart provides an essential road map for navigating the process. This resource guide explores the myriad of care options and offers essential information on topics ranging from self-care to legal and financial preparedness.
In order to use this feature, we need some information from you. You can also login or register for a free account.
By clicking submit you are agreeing to our cookie usage and Privacy Policy
Already have an account? Login
Already have an account? Login
Want to create an account? Register
In order to use this feature, we need some information from you. You can also login or register for a free account.
By clicking submit you are agreeing to our cookie usage and Privacy Policy
Already have an account? Login
Already have an account? Login
Want to create an account? Register
This website uses cookies to ensure you get the best experience on our website. Our privacy policy
To ensure the best experience on our website, articles cannot be read without allowing cookies. Please allow cookies to continue reading. Our privacy policy
0 Comments