How To Keep Your Business Data Safe

One of the US’s leading experts on cybersecurity says all businesses are vulnerable to hacking. But he also asserts that there are ways to protect sensitive data.

Col. Cedric Leighton, military analyst for CNN and former National Security Agency deputy training director, spoke Wednesday 27th September, at Bank of Utah’s Fall Speaker Event in Lehi about managing cybersecurity risk in any industry.

“I hope to increase awareness of cybersecurity issues so companies will think defensively in the cybersecurity realm. You need to realise every time you have a connection to the Internet you increase your vulnerability,” Leighton said in an interview after the event. “It is also equally important that you understand how to defend yourself pro-actively.”

His message during the presentation conveyed a sense of urgency for industries to adapt this “proactive defense” mentality. Citing pertinent examples of hacking, including the most recent news about Expedia, Leighton said the United States is in the midst of a cyber war.

“Data has become the world’s most valuable resources and the new data economy absolutely needs to be secured,” he said.

He refers to places like China, North Korea and Russia as nation-state hackers. These countries are blatantly working on massive hacking programs to further their goals of both economic and world dominance, Leighton said. He explained that the hacking is not just technical, but a psychological social engineering issue as well.

“Hackers engage in psychological manipulation. That’s what they do,” he said, using examples of hackers planting stories on new websites and hacker bots buying advertising on Facebook for political posturing. “It’s more about what actually happens in people’s minds.”

Leighton said he estimates the cost of hacking globally to be $2 trillion annually, with as much as half being the cost to the United States alone. He firmly believes cyber threats, combined with artificial intelligence and physical attacks, are the next frontier of global warfare.

To combat all of this, Leighton suggested public-private partnerships between government and businesses to create a “resilient cyber infrastructure,” and develop national cyber strategy. Companies also individually need to be creative, and “understand the threat vectors are many and varied.” Because of this, they need to reach out to specialists who have specialised in protecting those specific threat areas.

Leighton also cautioned business leaders in attendance of the biggest open door to their businesses, phishing scams.

Hackers have become highly sophisticated at pretending to be colleagues or friends in sending email messages. But their messages have malware links or PDFs that appear innocent. To combat this sanitisation software has been proven to be the most effective way to combat this within organisations.

Still, once businesses have proactively fortified their data security, the job still isn’t done.

“Even if you do all these things, it becomes a continuous process, because the attack vectors change all the time,” Leighton said. “The key watchword there is proactivity.”

Herald Extra:

You Might Also Read:

Cyber Security is Now Business Critical (£):

 

« Government Cyber War Games
When AI Takes Our jobs, Only Developers Stand A Chance Of Work »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.