ABOUT US
In the News
 

3-Step Guide to Analyzing if your Business is Secure

February 2017

Is your business safe from cyber attacks and other cyber liabilities? It is important for every type of company to know that their company and customer information and technology is safe.

“The burden to assess risk and fortify security falls on each individual—every worker, owner, manager, executive — and, perhaps most importantly, the chief executive. Everyone needs to appreciate these new risks, which aren’t going to dissipate anytime soon, especially CEOs responsible for setting priorities. Though the challenge is daunting, the solution need not be. Here are three fundamental questions that can help you begin to become security savvy.

  1. Do you know your data? Any intruder who cracks into your organization’s network will quickly assemble a detailed accounting of where the valuable data is stored and who has access to it. Stealthily ex-filtrating data over extended periods is a well-established, continually-evolving craft. It is vital to know what you’ve got and how it is being protected. That should lead to an ongoing dialogue about keeping up with best security and privacy practices.
  2. Do you understand your employees? Humans are enterprising and collaborative, which makes them susceptible to trickery. Getting smart, busy workers to click on a tainted web link or a corrupted web page or insert a corrupted USB key or DVD into a machine inside your firewall, has become an art form. And humans can be greedy and vindictive, posing a major insider threat. It is important for all employees to fully grasp what constitutes unacceptable behaviors, and monitoring tools and policies can both support productivity and cover the gaps.
  3. Can you vouch for all of your partners? In the name of efficiency, smart systems now routinely integrate access and control of fire and police alarm and environmental monitoring systems. As part of this shift, software makers, contractors and other third parties are routinely given high-level access to company networks. Hackers guys know this and are taking advantage. Limiting and monitoring partner access can be done in smart ways.

A comprehensive understanding of your company’s digital assets, and everyone who can reach those assets, is the starting point for developing effective security practices and policies and for making smarter security investments. The good news, if you run a company and are seriously weighing these questions, is that there is an expansive community of security vendors and consultants available to help.”

Don’t Risk Sacrificing Your Company’s Reputation. Contact us for Cyber Liability Insurance.

Article written by Byron Acohido

For full article: http://thirdcertainty.com/best-practices/a-3-step-guide-to-fortifying-security

Call VTC