SCOTT HIRSCHFELD
President, CTAccess
October is National Cyber Security Awareness Month. Even though today is the last day of October, this important issue is an evergreen concern for business leaders. With the rise of telecommuting and cloud-based applications, managing and securing your data and communications is more important than ever.
This blog post originally appeared on Steal These Ideas in 2011, but its message is just as strong today.
When discussing the need for tightened information security, I often hear people say, “We haven’t had any problem yet.” Compare this to the equivalent statement about the security of a home: “Although I live in the worst section of the city, I don’t really see a need to lock my doors, get a security system, or keep my kids from walking the streets at night…because I haven’t had a problem yet.”
Our organizations really do live in the “worst section of the city” — just by being connect to the internet, we’re instantly accessible to cyber criminals. There are 5 key factors every business person should understand about their information security risks:
1. Information theft is the number one activity of organized crime.
Internet threats are no longer coming from a teenager creating viruses or hacking someone’s network for a power trip. Cyber crime is organized, structured and planned with a single goal: to gain valuable information to sell or exploit. Estimates for 2011 show that this is an over a trillion dollar business.
2. Your business is a target.
It does not matter how large or small you are – you’re in the crosshairs. Most of the tools cybercriminals use are indiscriminate. Once the automated tools used by cybercriminals gain access to your systems, it will scour them for any information of value, from credit card numbers to social security numbers to medical information. Even if the tool finds no valuable information, it may exploit your systems to help steal information from other organizations.
3. Cybersecurity is an ongoing battle...that will never stop.
Most businesses have virus and spyware protection, firewalls and other measures. All of these things and more are necessary. Threats are continually evolving, and you need to actively monitor, detect and respond to them. Employees need to be repeatedly educated on new threats and how their conduct can put the company at risk.
4. Annoying spyware can be a good thing.
Often we treat spyware as an annoyance that messes up the usability of our machines. The fact that it often causes problems with daily use of our computers is actually a good thing. This is a red flag indicating a significant security breach — and should be treated as such. It is far more dangerous for spyware to go undetected [and it often does.]
5. Your people should never be overlooked.
When implementing protection from cybercrime, start with your people. Without training employees on the risks, often they will unintentionally create a breach. This breach is often caused by falling prey to a phishing scam, installing something they should not, or even by unzipping what looks like a simple software update.
The information that we store on our computer networks is increasingly critical, and in response, the profitability of information theft is growing. Is your business changing its practices to reflect this growing risk? [Comment below with any questions or discussion on this article!]
Related Posts:
Creating a Policy for Electronic Records Management
Cyber Liability: Are YOU at Risk for a Data Breach?
Cyber Risk Is Everywhere. Where Might YOU Find Exposures?
Information Risk: What Every Business Owner Needs to Know