Cyberattacks at the internet

0 7

Experienced outdoor players know that with a severe cold, the secret to success is basic protection. That is, the body temperature prevents cold, snow and ice from affecting the effect through the continuous improvement of layers, wax and technical fabrics. The same can be said for cyber security. With organizations and activists in the ninth month of their coveted 19, it's time to get ready as the threat of cybersecurity grows. Cyber security experts predict that by 2021, cyber taxes will occur every 11 seconds. That's twice as much as in 2019 (every 19 seconds), and four times as much as five years ago (every 40 seconds in 2016). The global economy is expected to cost 1 6.1 trillion a year for cybercrime, making it the world's third largest economy after the United States and China.

The epidemic continues as the population is a large part of the house - with all its attractive presence - and it is suitable for exploitation. The humble home router has become an attack on the surface, and targets hasty, hasty, boring and stressful employee selection. Not surprisingly, during the first month of the epidemic, 4,000 infected COVID sites popped up on the Internet. Epidemics forced organizations to innovate and adapt more quickly. Education, medicine, travel, retail and food services are some of the industries that have been fundamentally replaced by COVID-19. Unfortunately, change and security rarely go together. What can organizations do to prepare after that? It collapses to protect the core: the people, processes and data that are most important to the organization.

Protection of people

People incorporate their personal habits, good and bad, into their professional life. People who reuse passwords for various online stores, or use weak, easy-to-remember passwords (pet names, anyone?) Tend to fail when creating or using a corporate password and database. They are likely to keep clicking on phishing emails and engaging (innocent or not) with potentially destructive messages.

Protecting Processes 

That organizations should allocate resources according to their priorities seems a clear statement. However, if the business model changes completely, are the organizational processes ahead or behind? Often, during times of rapid change, treatment latency remains in place. Without realizing them, it is difficult to understand the dangers. Therefore, it is the information technology (IT) department of the organization that must constantly monitor, review and update procedures. Shadow IT is an application or software used by a person on a computer without the knowledge or approval of computer services, such as games or browser add-ons for purchases. Better yet, nothing bad will happen. In the worst case, the remote software is caused by a system crash or allows you to download surveillance software or malicious code.

Shadow IT may be inevitable, especially since computers can be used by many people at home for many reasons, so that the organization can monitor known vulnerabilities and explicitly inform all those employees. This also means that organizations provide secure and locked computers to home employees that prevent them from installing the software.

Data protection 

is the last and most important place to protect an organization's data. 

Administrators, supervisors and directors should have a clear understanding of this statistic. Which organizes, processes and transfers. A recent study found that companies share sensitive and confidential information with more than 500 third parties. The first step to protection is to make an inventory and, if necessary, analyze these third parties. Second, organizations need to maintain industry-related cybersecurity metrics such as frequency trends and changing attack patterns and intensity. They can compare themselves and manage resources accordingly. This includes tracking three key metrics: the time it takes to identify an attack, the time it takes to respond to it, and the time it takes to repair any damage.

Finally, cybersecurity conversations need to go beyond the deadly speeches that characterize most debates, especially during the winter. As with warm coats and winter tires, investing in cyber resilience will drive growth and positive performance. Cyber attacks are on the rise. As athletes prepare for dressing and seasoning, organizations are always proactive in enabling people, processes and data.

Sponsors of OfficialGamboaLikeUs
empty
empty
empty

1
$ 0.69
$ 0.69 from @TheRandomRewarder
Sponsors of OfficialGamboaLikeUs
empty
empty
empty

Comments