Access Systems Blog

Cybersecurity - it takes a village

Posted by Emily Petrowski on Nov 22, 2016 5:23:09 PM

curcuitTechnology surrounds our lives. On a daily basis, we create documents, images, and posts that are likely to contain private information about you, your company or your clients.

So, how do you secure your data from unauthorized access, attacks, and damages?

One word: cybersecurity.

Cybersecurity refers to the practices designed to protect networks, often referred to as information technology security.

October is Cybersecurity Awareness Month and with information technology growing at an accelerated pace, it is more important than ever to ensure that your data is under lock and key.

ESET, one of the world’s most influential IT security firms has created a five-step roadmap for organizations to follow:

  • A – Assess your assets, risks, resources
  • B – Build your security (policies that spell out protective measures)
  • C – Choose your controls (screen data sharing)
  • D – Deploy controls (anti-malware and anti-spam)
  • E – Educate employees, executives, and vendors
  • F – Further assess, audit, test

In a study done for ESET in 2012, 93% of U.S. device users have not received any computer security training within that year. One of the easiest steps in the ESET Roadmap to keep your company safe is to train employees on their role in cybersecurity.

Gone are the days where requiring an annual review of your company’s IT were enough.

Organizations IT departments should follow this simple equation:

Vulnerability (flaw or weakness in system) + Threat (the potential for an individual to act) = Risk (Liability or loss)

It is nearly impossible to manage threats to your company’s information. You can, however, monitor your vulnerability. Here are three easy implementations on how employees can play a role in keeping data safe:

  • Keeping a clean machine - It is as simple as defining clear rules for what employees can and cannot install or download and keep on work devices
  • Have focused sessions on exploring different types of cyber attacks:
    • Social Engineering Activities:
      • Social Media
      • Blogs
      • Suspicious links (when in doubt, throw it out)
    • Train employees on how to recognize an attack and how to react if one occurs:
      • Unplug machine from the network
      • Notify administrator of any suspicious emails, unusual activity or lost device
      • Memorize emergency IT number

It is impossible to manage every threat and every vulnerable point within an organization’s network, but by establishing a training initiative and a plan of action, you can help keep your data safe.

Topics: Blog

Search Articles

    Subscribe Here!

    Recent Posts

    Posts by Tag

    See all