- Penetration Testing Important, but…
- Social Engineering and Poor Patching Responsible for Over 90% of Cybersecurity Problems
- Breach Incidence and Costs On the Rise Again + 5 Ways to Reduce Your Risk
- Cybersecurity Insurance Policies Require Security Audits and Pen Testing
- Wireless strategies for business continuity gain importance as enterprise expand IoT, cloud, and other technologies
- How Cybercrooks are Targeting YOU
- Enabling Digital Transformation with Cisco SD-WAN
- WFH Post Pandemic – What It Will Look Like. What You’ll Need.
- Leaders to looking to the IoT to improve efficiency and resiliency
- Cyber Security Vernacular – Well, some of it, for now
- Why You Need Disaster Recovery, NOT Just Back-Ups
- 10 Reasons Why Having an Expert Manage Your Cybersecurity Makes Sense and Saves Dollars
- Converting CapEx IT Investments into Manageable OpEx
- The Hybrid Workplace – Planning the Next Phase
- Cisco Cloud Calling: Empowering Customers to Thrive with Hybrid Work
- When You Can’t Access the Cloud
- How to Keep On Keeping On
- New Cisco Research Reveals Collaboration, Cloud and Security are IT’s Top Challenges
- Threats from Within on the Rise
- Cloud Covered? If Not, Take Cover!
- Zero Trust and Forrester Wave Report
- Password Based Cyber Attack: Like Leaving Keys Under Doormats
- So, What’s Up With Sensors?
- Sensors and Systems Create a Digital “Last Mile” and Help Skyrocketing Costs
- Scanners Provide Peace of Mind for Returning Students and Workers
- Sensors Improve Operations and Bottom Line… Easily and Cost-Affordably.
- Cisco Meraki Looks at 2021
- 2020 Holiday Shopping: Cybersecurity and Other Tips to Safeguard Wallets and Systems
- How to make the most of the technology you have
- Personnel, Planet and Business Progress: More Interdependent Than Ever Before
- Sure… you can get them all in the boat – but can you get them to work well together?
- Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave
- Cloud Data Must be Protected, Too!
- Don’t Let Anyone Get the Dirt on You – Make It Instead!
- How IoT Devices Can Help You and Your business
- WebEx – A World of Possibility
- Creating Your Breach Response Plan Now Will Save You Thousands Down The Road
- Been hacked? Here’s what you must do next.
- The Need for Pen Testing is At an All-Time High
- 5 Ways an IT Reseller Improves Your Performance and Peace-of-Mind
- 5G and Wi-Fi 6: Faster, more flexible, and future ready. Are you?
- Network and Data Security for Returning and Remote Workers + Disaster Recovery Symposium
- Collaboration and Cisco WebEx: Protecting Your Data
- Thursday’s Virtual Conference Tackles Today’s Supply Chain Trials and Tribulations
- 10 Tips to Reduce Cloud Storage Risk
- COVID-19 Crisis Fuelling IT Spending
- Supply Chain/Logistics Experts Share Their Expertise
- Cisco Breach Defence Overview
- Announcing Our New Website and Blog
When dealing with a cybersecurity breach, it can feel like the sky is falling. In a sense it is.
In 2019, the average cost of a single data breach was $3.92 million. This can include downtime, the cost to restore data, loss of business and customer confidence, fines and other related charges.
According to multiple authorities and security providers such as Aruba, Cisco and Palo Alto, as well as research conducted by institutions such as the University of Maryland, in North America alone, there are over 1,000,000 cyber attacks each and every day of the year. And malware attacks have increased 350% in the past year – and the numbers continue to climb as people continue to work remotely.
Even a small attack can set a business back and cost precious time, money and resources. Security companies predict that today’s rapidly evolving technologies, and adoption of new applications, will result in a new “boom” of cyber-attacks.
For example, attacks on collaboration platforms alone have increased by 300% since February 2020. Although major corporate breaches make headlines, nearly half of breach victims are smaller organisations – and the impact on these businesses is usually greater, because they often have fewer resources with which to recover and rally.
For companies of all sizes, having to deal with legacy systems compounds the problem. Introducing new applications, adding new endpoints and other hardware, making it possible for employees and other stakeholders to connect remotely, and otherwise increasing demands on the network, opens you up to vulnerabilities in multiple areas.
A July 2019 study conducted by the Ponemon Institute shows that 57% of breach victims indicated they had been aware of a network security issue but that it had not been addressed prior to the attack.
One of the challenges for IT professionals can be convincing senior management that security investments are an important component of fiscal responsibility. Something that has worked well for some clients: Calculate how much revenue would be lost if the company were to halt operations for five days. Now, add in the fines levied in your region for data privacy breaches. Although this figure will only represent a portion of the dollars at risk from a data breach, it is usually a scary enough sum to prompt a loosening of IT budgets.
The same Ponemon Institute study suggests that over half of IT leaders don’t know how well their security is operating. For this reason, it is advisable to hire an outside expert to conduct a security assessment at least once a year. This will give you a list of where you are vulnerable, Firms are also advised to consult their network and other business insurance requirements – for some types of businesses, the insurance is not valid if a network security audit is not completed every 3 – 6 months.
Once you are confident your network is secure, it is a good idea to conduct a penetration test, too. This is when an expert will attempt to breach your network using a combination of remote white hacking and social engineering. 99% of malware is delivered via email, with spoof emails appearing to come from the company’s HR department getting the highest open rates. USB keys, charging cables and other such “gifts”, can also impact the payload. We combine multiple approaches, with various levels of escalation, when conducting pen-testing. The results usually surprise (read “shock”) our clients.
As the world upgrades its platforms to accommodate the “new normal”, it is imperative to consider the security implications of these changes.
Please contact us to learn more about conducting a security/system vulnerability assessment or penetration testing. In the meantime, ensure you back up everything and ensure your disaster recovery plans and protocols are in place.