BreachExchange mailing list archives

Protecting Your Company From Cyberattacks


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 19 Oct 2015 18:00:54 -0600

http://blog.mysanantonio.com/texasmd/2015/10/18/protecting-your-company-from-cyberattacks/

It often seems like not a day goes by without word of another cyberattack
or data breach. From the United States government to major retailers, no
one is immune from dedicated and talented hackers.

If you think your own business is safe from cyberattacks and data breaches,
chances are you are mistaken. It is not a matter of if hackers will target
your network. It is only a matter of when. If you have not yet taken steps
to secure your network, you are living on borrowed time.

One of the easiest and most effective things you can do to protect your
network is to install a quality spam filter. The majority of cyberattacks
and phishing attempts come through email, and simply keeping spam out of
your network can greatly reduce your risk.

Of course, even the best spam filter is not perfect, and it is impossible
to keep every junk email out of your employees’ inboxes. That is why
training is so important, and why you should be taking proactive steps to
help your employees protect your network.

Recent examples have shown that humans are often the weakest link in the
data security chain. Computers have always done exactly what they have been
programed to do, and that is why human error climbs to the top of the list.
Better employee training and more comprehensive policies can go a long way
toward keeping your data secure and safe from hackers.

One of the best things you can do as a business owner is to train your
workers to never click links in emails from unknown recipients. While
emails and attachments from fellow employees are likely to be safe, the
same cannot be said of attachments from other sources. Teaching your
employees to be suspicious of unknown senders is one of the smartest things
you can do to secure the company network.

Teaching employees to avoid clicking links and opening unknown attachments
is one part of the process. Asking employees to report any suspicious
emails or attachments is just as important.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: