Kiran Bhagotra
CEO/CTO/Founder, ProtectBox
Nov 6th, 2020
Want to learn how to protect your company from cyber attacks? Protect Box answers your questions.
It’s taken as a given that most cyber attacks could have been prevented – and this is borne out by the evidence. A 2019 analysis suggests that almost all cyber attacks over the previous year were entirely avoidable – and predictions for the year ahead are painfully similar.
So, it’s important to invest in protection from new and on-the-horizon threats like weaponised AI and poisoned machine learning data, but you should also make efforts to shore up the foundations of your cybersecurity strategy.
After all, what’s the point in investing in state-of-the-art threat detection systems if your employees leave their devices unattended or are vulnerable to phishing scams?
Below, we’ve outlined five key areas where businesses often fall short cybersecurity-wise, and how you can avoid doing so.
How to Protect Your Company from Cyber Attacks
1. Staff Training
Understanding how to protect your company from cyber attacks involves understanding your biggest potential liability – your employees. In a significant number of cases, cyber criminals gain access to your company’s sensitive information by manipulating those that work for you.
If you offer your staff appropriate training, you can cut this risk significantly. Provide all employees with compulsory cybersecurity training as part of their onboarding activities. Go one step further and enrol everyone on annual top-up sessions.
How to Protect Your Company from Cyber Attacks with Staff Training
The type and level of training you offer will depend on the nature of your business, but at the very least, the following should be included:
- Password health: setting strong passwords and changing them regularly
- Device security: locking devices whilst away from desks, using screen shields in public places, locking up devices securely at the end of the working day
- Identifying social manipulation attempts: identifying and reporting phishing scams and potentially malicious links in emails and social media messages
- Reporting protocols: what to do and who to report to in the event of a security incident
- Whistleblowing: how to report concerns about security protocols further up the line of command
- Everyday processes such as employee training, installing patch updates and running regular scans for security threats
- Emergency processes such as security incident response or data recovery plans
- Reducing access points for cyber attackers.
- Reducing potential to leak due to employee error. Fewer employees with access means fewer people that can leave their work laptop on the train for example.
- Reducing scope for intentional leak due to malicious employees (Verizon’s 2020 Data Breach Investigation Report suggests that a significant 30% of data breaches were due to internal actors).
- Making it significantly easier to identify the source of a leak. It’s much easier to take corrective action if you know that one of five user credentials has been breached, rather than one of fifty-five.
- Adding an extra layer of security – ID&V software should use two-factor authentication to make it more difficult to hack in via stolen credentials.
- Accidental data loss in the event of a natural disaster like floods, fires or storms
- Data theft or deliberate server damage via break-in
- Shut down of backup servers during a cyber attack
- Significantly higher physical security than you’re likely able to realise in house. Larger data centres are protected by the full works – think laser detection systems, high-definition cameras, highly-trained security personnel. You might have a security guard and some CCTV, but does it really compare?
- The best experts in the business. Third-party data storage companies’ core competencies lie in data security. This means they have the capacity to employ top-of-the-range cybersecurity experts to keep ahead of all the latest threats. Unless you have a huge IT budget, you might struggle to match this.
- Access monitoring software, such as diagnostic programmes and intrusion protection/prevention systems
- Anti-spyware and anti-keylogger tools
- Security information and event management