Cybersecurity: A Personal Plan

Online, hooked up, plugged in and "on the cloud. Whether it is your own personal information such as saved passwords or credit card information or if it is your client's’ personal information, so much of our personal lives can now be easily accessed just with a little Wi-Fi. 

With our new found accessibility, everything at the click of a button, our lives have become all that much more convenient, and our businesses and assets have become all that much more vulnerable. Cybercrime has boomed over the last decade and has become a real problem for businesses, large and small alike.

In the US alone, more than 35,000 computer security incidents happen each day, and that is only the reported attacks. Many more attacks happen but go unreported as businesses aren’t legally required to report some types of attacks. According to PwC’s 2015 US State of Cybercrime Survey, a total of 79 percent of respondents detected a security incident in the past year. The security firm Gemalto estimated that in 2015 alone, more than 700 million data records were compromised, but unfortunately only 37 percent of organizations have implemented a dedicated cyber incident response plan.

All too often, companies consider themselves too small to be targeted by hackers or blame insufficient funds to invest in cybersecurity. But recent studies have shown that because of these reasons alone, small- and medium-sized companies are the first to be picked on. 

As intelligent individuals, hackers know that smaller companies can’t afford to invest in heavy data security, which makes them an easy target. But it is important to note that very often it doesn’t matter what size your company is, it’s more about who you do business with, client and partnership alike and what kind of data you store. 

Businesses that carry a lot of customer contact information like credit cards, health data, or valuable intellectual property are at a high risk of a cyber-attack.

Moreover, if you have any online contact with larger companies that carry and store this kind of information, you can become an easy target. Especially if your non-secure systems can unlock access to your partner’s data.

For many who are still on the fence about whether or not to invest in a protection plan, previous hacks on well-known companies should be enough to sway anyone. Think of Target’s big hit in 2013. 

Most cyber insurance premiums range anywhere between a few hundred to several hundred thousand. Compare that to the $291 million that Target had incurred as of January 2016 in breach-related costs (this includes crisis communications, forensics costs and legal fees). The average costs of legal fees alone after a data breach is nearly $700,000. For larger companies it can reach up and beyond $3,000,000. 

The necessity of strong cybersecurity measures is self-evident. Governments, individuals and companies are caught in the cross hairs. Yahoo itself has also disclosed a massive breach that, along with Target’s hack, is still making headlines.

Unfortunately, companies aren’t spending enough time on training their employees and investing in a security plan. According to a survey, the most common passwords on computers were "password", "123456", and "12345678". In fact, the report revealed a high volume of low levels of security awareness among users and that eight in 10 attacks could be prevented just with basic computer security and better passwords alone. 

This includes better passwords on social media sites and even physical security measures like video object tracking to detect potential physical attacks on your company. The most common form of cyberattacks involve the hacking of social networking sites, along with malicious software targeting computers and credit card fraud.

Whether big or small, your company should be investing in a well-defined security policy. Whether you invest in a hefty insurance policy and implement as many preventative measures possible or even if you train your employees in better computer security, the effort and investment can save you millions down the road. 

Invest in securing your data; it may be the best investment you make ever.

BetaNews:           Cyber Insurance Report 2016 (£):
 

 

« Cuban Telecom Etecsa Starts Home Internet Trial
Malicious Ads Expose Millions To Hacking »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

ColCERT

ColCERT

ColCERT is the national cybersecurity emergency response team of Colombia.

Black Breach

Black Breach

Black Breach experts protect your organization from cyber threats with military-grade AI-tooled cybersecurity solutions.