Does your organization have cybersecurity as a priority?
The rapid shift to remote work and the accelerated digital transformation from last year have helped cybersecurity make its way into collective consciousness. As we enter a new era of hybrid workplaces, it’s vital to take a step further and embed security into every aspect of an organization.
The fourth week of Cybersecurity Awareness Month, led by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), runs under the theme “Cybersecurity First”. So how to operationalize this concept and ensure security is truly built-in priority with no impact on productivity?
The first step is always awareness of the situation.
During the pandemic, mass remote work expanded the corporate attack surface, and exposed new gaps in protection ruthlessly exploited by threat actors. They targeted unpatched Virtual Private Network (VPN) services and Exchange servers, hijacked Remote Desktop Protocol (RDP) endpoints protected by weak or breached passwords, as well as misconfigured cloud systems, and more.
In general, attackers use a variety of vulnerabilities and phishing attacks to compromise the security of networks and devices, as well as execute identity theft and scams.
Read More: How to Prevent Phishing in the Workplace
According to CISA, as of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 2019.
However, as much as cybercriminals step up their game, human error still accounts for 95% of all cybersecurity breaches. This is especially worrying considering that 77% of organizations do not have a cybersecurity plan to prevent or respond to attacks.
It’s not only the cost of the actual data breach, but also the costs of litigation, recovery, customer compensation, the effect on reputation, compliance risk, credit risk, etc.
To approach these threats effectively and protect interconnected business networks, cybersecurity prioritization would do much to eliminate the gaps so frequently exploited by attackers.
Secure-by-design is a key principle of the GDPR that states security must be built-in rather than bolted-on. So what does it look like in practice?
Read More: 10 Tips from a CISO to prevent Ransomware
May the new normal change cybersecurity’s status from ‘afterthought’ to ‘priority’. As cyberattacks and their consequences grow, the imperative for cybersecurity and resilience is becoming increasingly important, not just to businesses, but also homeland security, schools, and individuals.
Rising regulatory pressure is coupled by increasing third party risks, and your organization needs to extend cybersecurity practices beyond its own perimeter.
This strategy guide explains how to sustain a secure vendor ecosystem by solving security and compliance problems for enterprises and third party vendors.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |