Education Is The Key To Minimise Cyber Risk For Business

Cyber criminals are cunning and are constantly coming up with new ways to steal information. The schemes are sometimes sophisticated and sometimes not at all sophisticated, but nevertheless can be effective.

One of the largest risks associated with information security is the “people” factor. The “people” includes an organisation’s company staff, but also third-party vendors as well as the user community. The proliferation of doing business online and using email as a principle means of cost-effective communication has left businesses organizations open to unscrupulous individuals and entities that can easily break into their circles of trust.

Education is one of the defense pillars for this type of risk. For example, Wayne Cooperative Insurance Company (WCIC) has worked works closely with an independent consultant to craft an educational program for its agency force.

The program provides a review of basic cyber risks and things to consider in operating in an electronic world. This is the second educational seminar that the WCIC has provided to its agents on this subject matter. It has an education program in place for its staff as well.

This is because training is essential for employees and anyone who has access to an entity’s company information. Education needs to be provided on a regular basis for those responsible within the IT Department and also to others in a manner that is understandable to those who may not be tech savvy.

There are many ways that an organisation can better secure their information, but one of the most fundamental steps is making sure those that have access to systems and data know how to keep it protected.

With this in mind, education is the first concept identified in the recent Guiding Principles to Advance Information Security in New York. The New York Insurance Association, Independent Insurance Agents and Brokers of New York and Professional Insurance Agents of New York embarked on this endeavor to start a broader conversation about information security and encourage enhanced education.

The insurance industry is in the business of offering financial protection, and as a result, takes the protection of policyholder information that much more seriously. The document delves into 11 other principles key to information security, but without education, any security plan will be limited in its effectiveness.

Entities of all types and sizes are looking to put additional security measures in place by assessing vulnerabilities and addressing risks that exist. As the threats morph, entities are continuing to broaden and deepen their protection.

A consistent commitment to education by an entity ensures that everyone is on the same page and understands the changing exposures that exist in the business world.

Insurance Journal:                  Insurance & Cyber Vulnerability - Get Your Report for 2016 (£):

« Pentagon Wants to Use Social Media On the Battlefield
IBM Think Ahead: Soon Watson AI Will Be Behind Every Decision »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.