Still relevant?
When perusing the interwebs and thinking of an idea for a column for you all this morning, my mind catapulted into so many things, like the Internet of Things (IoT) and many more. The one that stood out in my mind amongst the rest… is actually having a division of one (please at least have two) or more cyber security professionals in your business, company, or organization. It might sound daunting for a business owner to include another division or department when factoring in the overhead, but having a cyber professional who knows what he or she is doing to keep your assets and attack vectors safe - then it is money well spent. There are many articles out there to bolster my claims to not let up in prioritizing cybersecurity in organizations.
Do you think the size of your business/ organization excludes you from being attacked? I can tell you that no matter the size of your organization, hackers, threat actors, inside threats, etc., they don’t care. Those individuals don’t care how small or large the organization is that there hitting because if they succeed they can and will exploit all your vulnerabilities to get their “pay check.”
So, to combat that, putting key cybersecurity professionals - red (offense team) and blue (defense team) - should be in the forefront of organizations minds. These professionals are the ones who will run reports, look into flags, run comprehensive reviews of data and analyze incoming and outgoing traffic, keep hold of data and make sure it is secure and the list can continue. These professionals are extremely important to any organization.
What happens to your organization when it gets attacked? If your data and information is leaked? What would you do in a situation where you don’t know to begin. Most organizations have a CSM (cybersecurity management) built into the software that they use to handle client data, but what are the measures you are putting in place to protect YOUR credentials and PPI for YOUR organization? These are questions that every business/ organization owner needs to have answers for. These answers should be placed within the Disaster Recovery Plan. If you do not have a Disaster Recovery Plan, this is the time to make one. There are many websites that describe the steps and such to create, uphold and continue to maintain your plan. Fortinet.com, vmware.com, upguard. com, ibm.com and oracle.com are just a few that list key aspects to help you.
Remember that no matter the size of your business/organization, threat actors and hackers can and will attack. It is only right that we have a defense up and have some hidden tools in our pocket to reduce the impact when it does happen. We all lose something sometimes It is up to us on how we respond.
SEEKING
W
ONDER
BY
SAMANTHA Y OCIUS CREATIVE MEDIA