BreachExchange mailing list archives
Protecting Your Company From Cyberattacks
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 19 Oct 2015 18:00:54 -0600
http://blog.mysanantonio.com/texasmd/2015/10/18/protecting-your-company-from-cyberattacks/ It often seems like not a day goes by without word of another cyberattack or data breach. From the United States government to major retailers, no one is immune from dedicated and talented hackers. If you think your own business is safe from cyberattacks and data breaches, chances are you are mistaken. It is not a matter of if hackers will target your network. It is only a matter of when. If you have not yet taken steps to secure your network, you are living on borrowed time. One of the easiest and most effective things you can do to protect your network is to install a quality spam filter. The majority of cyberattacks and phishing attempts come through email, and simply keeping spam out of your network can greatly reduce your risk. Of course, even the best spam filter is not perfect, and it is impossible to keep every junk email out of your employees’ inboxes. That is why training is so important, and why you should be taking proactive steps to help your employees protect your network. Recent examples have shown that humans are often the weakest link in the data security chain. Computers have always done exactly what they have been programed to do, and that is why human error climbs to the top of the list. Better employee training and more comprehensive policies can go a long way toward keeping your data secure and safe from hackers. One of the best things you can do as a business owner is to train your workers to never click links in emails from unknown recipients. While emails and attachments from fellow employees are likely to be safe, the same cannot be said of attachments from other sources. Teaching your employees to be suspicious of unknown senders is one of the smartest things you can do to secure the company network. Teaching employees to avoid clicking links and opening unknown attachments is one part of the process. Asking employees to report any suspicious emails or attachments is just as important.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Protecting Your Company From Cyberattacks Audrey McNeil (Oct 20)