Strategies for Protecting and Managing Cyber Threats
Now in its 13th year National Cyber Security Awareness (NCASM) continues to educate users, small and medium sized organizations and others on the importance of cyber security education and best practices. This year, its more important than ever as our world becomes more connected with the Internet of Everything (IoE) security conversations happen everywhere from the breakroom to the boardroom, so this week we’ve included a roundup of stories that offer tips on how to recognize and combat cybercrime, how to determine the security of your enterprise and what to do if a breach happens.
How Secure is your Enterprise?
With recent headlines talking about stolen emails and possibly state-sponsored system hacking, every enterprise should be more than a little concerned about cyber security and the overall safety of their data. Let’s face it—your information technology systems have been, or someday will be, compromised. No amount of planning nor technological countermeasures is likely to be enough to stop motivated perpetrators from penetrating your defenses. But there are some good measures to take to ensure your organization is prepared. Read more here.
Recognizing and Combating Cybercrime
News source CNBC reports that cybercrime victims lose an average of $358 and spend 21 hours fixing the problem. A new study by Michigan’s Ponemon Institute shows average annual losses to companies worldwide now exceed $7.7 million, with companies in the study losing up to $65 million. Forbes says that cybercrime costs may reach $2 trillion by 2019. So how you can you recognize and combat cybercrime? Read on for more.
Lock Down Your Login and Password for Better Online Security
President Obama is partnering with the National Cyber Security Alliance (NCSA) to start a public awareness campaign they call “Lock Down Your Login.” The idea is to encourage more people to go beyond mere usernames and passwords for authentication purposes. According to the White House, as many as 62% of successful data breaches could have been prevented with better use of authentication systems. These authentication systems include biometrics or dual-factor authentication to supplement usernames and passwords. Read on to find out more.
Mayer Brown Releases Cyber Security Handbook to Cover Regulatory Guidance across Industries
October is National Cyber Security Awareness Month (NCSAM). However, for many in the business community, the need for mere awareness has long passed. Now, many organizations are focused on the next step: planning—how does management best prevent against a breach, and if a breach does happen, what are the next steps? Find out more here.