Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
• https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/forbestechcouncil/2017/01/17/
why-cybersecurity-should-be-the-biggest-concern-of-2017/&refURL=https://basecamp.com/&referrer=
• http://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-17-security-predictions-for-2017.html
• https://www.entrepreneur.com/article/289680
• https://www.business.com/articles/how-to-protect-your-small-business-from-cyber-attacks/
• http://www.pcmag.com/article/345531/how-to-protect-and-recover-your-business-from-ransomware
• http://www.information-age.com/6-critical-steps-responding-cyber-attack-123459644/
SOURCES:
When it comes to cybersecurity, your offensive line needs to be strong. Our team at Copper State Communications has over 35 years of industry experience. We are your trusted partner for all things business IT and communications -- including security.
35years
FOR GUIDANCE ON HOW TO CREATE A GAME-CHANGING SECURITY POLICY FOR YOUR COMPANY
CONTACT US AT
888.550.4484
VISIT US AT
COPPER-STATE.COM–OR–
On the field, there’s nothing worse than the offense dropping the ball and giving away a play. And businesses without a strong cybersecurity offensive strategy lose billions of dollars a year because
of security problems, attacks, and subsequent loss of business continuity.
The U.S. government increased its annual cybersecurity budget
this year, jumping to
$19 billion from 2016’s $14 billion.
The cybersecurity market is expected to show
12-15% year-over-year growth
through 2021.
No matter the size of your company, these threats are a real concern. Consider this:
Building a Better Cybersecurity Game-Plan
Here are a few tips to get you started down the road to a stronger security strategy:
Just like a champion football team, a comprehensive winning strategy considers both offense and defense. Likewise, to keep your data secure, your business should have
both proactive and reactive plans for potential security breaches.
ENCRYPT YOUR DATA
Hackers are looking for low-hanging fruit, so to speak. If important data is easy to access, it will be stolen. Always keep critical and sensitive data encrypted.
SECURE YOUR SYSTEMSSecure all IT systems to contain the breach, even if it means suspending a comprised section of your network -- or the network in its entirety. The cost of data restoration can be massive; minimize the impact of data loss to minimize financial loss.
INVESTIGATE THE BREACH
Your defensive line should include a technical team tasked with investigating the details of the breach, its effects on your business, and actions taken to remediate it.
SECURE YOUR DATA COMPREHENSIVELY
Anti-virus protection is non-negotiable as a basic security layer. And even if your systems include a built-in firewall, it is prudent to consider adding an additional layer of protection.
BE PROACTIVE WITH YOUR DATA AND EMPLOYEES
Make regular backups of your data. Train employees to understand their data protection responsibilities and to recognize social engineering techniques. Your data security policy should be put in writing and communicated to your entire staff.
UPDATE PASSWORDS REGULARLY
Passwords should be updated about twice a year and should use a strong mix of characters (letters, numbers, and symbols). Avoid the common mistake of writing your passwords on sticky notes.
OFFENSEHow to Prevent Cyberattacks
DEFENSEWhat to Do If You’ve Been Attacked
ADDRESS LEGAL AND REGULATORY REQUIREMENTSIn some cases, legislation contains regulatory notification requirements in the event of a breach (e.g., HIPAA and PCI compliance). Be aware of what those are and know who you need to notify after an incident.
MANAGE YOUR PR
For breaches that become public, be timely, accurate, and honest in any messages given to affected parties.