Security & Risk Management

Evaluating, analyzing, and managing the risk and security

Smart steps for better cyber-security

The ongoing explosion of cybercrime means companies must improve security to avoid costly attacks.

Some steps can be taken immediately.

Expand limits on which employees can access data and use the company’s network. Consider what can go wrong when employees work remotely or outside normal working hours.

Check vendors to see if they are prepared for a cyber-attack, which could ripple into your organization. Encourage them to take steps if they aren’t ready. 

One expensive lesson we have learned from cybercriminals: They can take the smallest of breaches and generate activity that threatens a company’s finances and its future.

Other, deeper steps will take time, planning and money: new security tools, better infrastructure, more cloud migration.

Include all employees

Cybersecurity works best when all your employees are trained and alert for possible attacks and weaknesses.

MIT Sloan Management Review recommends cyber training and periodic exercises to keep the issues in the forefront for your organization.

“Employees need to be informed of new cyber risks and reminded of their role in effectively preventing, detecting, responding to, and recovering from cyber-attacks.”

This should include walk-throughs for remote, hybrid and in-house staffers.

“Training programs should cover new threats, rules for approved device and data use, and processes to report suspected cyber incidents,” the review said.

Mark Wiener

CEO

Mark Wiener, CEO, BizCom Global has spent 30 years in the digital transformation industry even before it was a term.  Focusing on bringing together Operational productivity needs, Financial compatibility and IT standards and integration including security.  He works with companies from the halls of the fortune 500 down to the local mom and pop business focusing on how companies looking through the lens of a cloud first strategy can help achieve improved operational performance with planned and proper implementation of technology which include appropriate cybersecurity controls.

Mark prides himself on his ability to really listen to the customer, honestly assess their needs, and work relentlessly to assure the final solution exceeds the customer’s expectations.

Other Posts you might like...

Rating your cyber resilience
Preparation, detection, response, and recovery are the pillars of a successful cyber resilience program. These steps can keep your organization...
How cyber resilience works
Cyber resilience and cyber security may sound similar, but there’s a difference. Think of cyber security as the all-around approach...
People overlook easy protection
More people need to take preventive action to avoid hackers and other bad actors. Twitter’s revelation that only 2.3% of...
First, you’re hacked. Then you’re sued.
As if getting hacked isn’t bad enough, customers and employees can sue your organization for not providing better computer security....