Cybersecurity: A Personal Plan

Online, hooked up, plugged in and "on the cloud. Whether it is your own personal information such as saved passwords or credit card information or if it is your client's’ personal information, so much of our personal lives can now be easily accessed just with a little Wi-Fi. 

With our new found accessibility, everything at the click of a button, our lives have become all that much more convenient, and our businesses and assets have become all that much more vulnerable. Cybercrime has boomed over the last decade and has become a real problem for businesses, large and small alike.

In the US alone, more than 35,000 computer security incidents happen each day, and that is only the reported attacks. Many more attacks happen but go unreported as businesses aren’t legally required to report some types of attacks. According to PwC’s 2015 US State of Cybercrime Survey, a total of 79 percent of respondents detected a security incident in the past year. The security firm Gemalto estimated that in 2015 alone, more than 700 million data records were compromised, but unfortunately only 37 percent of organizations have implemented a dedicated cyber incident response plan.

All too often, companies consider themselves too small to be targeted by hackers or blame insufficient funds to invest in cybersecurity. But recent studies have shown that because of these reasons alone, small- and medium-sized companies are the first to be picked on. 

As intelligent individuals, hackers know that smaller companies can’t afford to invest in heavy data security, which makes them an easy target. But it is important to note that very often it doesn’t matter what size your company is, it’s more about who you do business with, client and partnership alike and what kind of data you store. 

Businesses that carry a lot of customer contact information like credit cards, health data, or valuable intellectual property are at a high risk of a cyber-attack.

Moreover, if you have any online contact with larger companies that carry and store this kind of information, you can become an easy target. Especially if your non-secure systems can unlock access to your partner’s data.

For many who are still on the fence about whether or not to invest in a protection plan, previous hacks on well-known companies should be enough to sway anyone. Think of Target’s big hit in 2013. 

Most cyber insurance premiums range anywhere between a few hundred to several hundred thousand. Compare that to the $291 million that Target had incurred as of January 2016 in breach-related costs (this includes crisis communications, forensics costs and legal fees). The average costs of legal fees alone after a data breach is nearly $700,000. For larger companies it can reach up and beyond $3,000,000. 

The necessity of strong cybersecurity measures is self-evident. Governments, individuals and companies are caught in the cross hairs. Yahoo itself has also disclosed a massive breach that, along with Target’s hack, is still making headlines.

Unfortunately, companies aren’t spending enough time on training their employees and investing in a security plan. According to a survey, the most common passwords on computers were "password", "123456", and "12345678". In fact, the report revealed a high volume of low levels of security awareness among users and that eight in 10 attacks could be prevented just with basic computer security and better passwords alone. 

This includes better passwords on social media sites and even physical security measures like video object tracking to detect potential physical attacks on your company. The most common form of cyberattacks involve the hacking of social networking sites, along with malicious software targeting computers and credit card fraud.

Whether big or small, your company should be investing in a well-defined security policy. Whether you invest in a hefty insurance policy and implement as many preventative measures possible or even if you train your employees in better computer security, the effort and investment can save you millions down the road. 

Invest in securing your data; it may be the best investment you make ever.

BetaNews:           Cyber Insurance Report 2016 (£):
 

 

« Cuban Telecom Etecsa Starts Home Internet Trial
Malicious Ads Expose Millions To Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

securitycurrent

securitycurrent

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.