offense - copper-state.comits annual cybersecurity budget this year, jumping to $19 billion from...

1
• https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/forbestechcouncil/2017/01/17/ why-cybersecurity-should-be-the-biggest-concern-of-2017/&refURL=https://basecamp.com/&referrer= • http://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-17-security-predictions-for-2017.html • https://www.entrepreneur.com/article/289680 • https://www.business.com/articles/how-to-protect-your-small-business-from-cyber-attacks/ • http://www.pcmag.com/article/345531/how-to-protect-and-recover-your-business-from-ransomware • http://www.information-age.com/6-critical-steps-responding-cyber-attack-123459644/ SOURCES: When it comes to cybersecurity, your offensive line needs to be strong. Our team at Copper State Communications has over 35 years of industry experience. We are your trusted partner for all things business IT and communications -- including security. 35 years FOR GUIDANCE ON HOW TO CREATE A GAME-CHANGING SECURITY POLICY FOR YOUR COMPANY CONTACT US AT 888.550.4484 VISIT US AT COPPER-STATE.COM –OR– On the field, there’s nothing worse than the offense dropping the ball and giving away a play. And businesses without a strong cybersecurity offensive strategy lose billions of dollars a year because of security problems, attacks, and subsequent loss of business continuity. The U.S. government increased its annual cybersecurity budget this year, jumping to $19 billion from 2016’s $14 billion. The cybersecurity market is expected to show 12-15% year-over-year growth through 2021. No matter the size of your company, these threats are a real concern. Consider this: Building a Better Cybersecurity Game-Plan Here are a few tips to get you started down the road to a stronger security strategy: Just like a champion football team, a comprehensive winning strategy considers both offense and defense. Likewise, to keep your data secure, your business should have both proactive and reactive plans for potential security breaches. ENCRYPT YOUR DATA Hackers are looking for low-hanging fruit, so to speak. If important data is easy to access, it will be stolen. Always keep critical and sensitive data encrypted. SECURE YOUR SYSTEMS Secure all IT systems to contain the breach, even if it means suspending a comprised section of your network -- or the network in its entirety. The cost of data restoration can be massive; minimize the impact of data loss to minimize financial loss. INVESTIGATE THE BREACH Your defensive line should include a technical team tasked with investigating the details of the breach, its effects on your business, and actions taken to remediate it. SECURE YOUR DATA COMPREHENSIVELY Anti-virus protection is non-negotiable as a basic security layer. And even if your systems include a built-in firewall, it is prudent to consider adding an additional layer of protection. BE PROACTIVE WITH YOUR DATA AND EMPLOYEES Make regular backups of your data. Train employees to understand their data protection responsibilities and to recognize social engineering techniques. Your data security policy should be put in writing and communicated to your entire staff. UPDATE PASSWORDS REGULARLY Passwords should be updated about twice a year and should use a strong mix of characters (letters, numbers, and symbols). Avoid the common mistake of writing your passwords on sticky notes. OFFENSE How to Prevent Cyberattacks DEFENSE What to Do If You’ve Been Attacked ADDRESS LEGAL AND REGULATORY REQUIREMENTS In some cases, legislation contains regulatory notification requirements in the event of a breach (e.g., HIPAA and PCI compliance). Be aware of what those are and know who you need to notify after an incident. MANAGE YOUR PR For breaches that become public, be timely, accurate, and honest in any messages given to affected parties.

Upload: others

Post on 30-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: OFFENSE - copper-state.comits annual cybersecurity budget this year, jumping to $19 billion from 2016’s $14 billion. The cybersecurity market is expected to show 12-15% year-over-year

• https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/forbestechcouncil/2017/01/17/

why-cybersecurity-should-be-the-biggest-concern-of-2017/&refURL=https://basecamp.com/&referrer=

• http://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-17-security-predictions-for-2017.html

• https://www.entrepreneur.com/article/289680

• https://www.business.com/articles/how-to-protect-your-small-business-from-cyber-attacks/

• http://www.pcmag.com/article/345531/how-to-protect-and-recover-your-business-from-ransomware

• http://www.information-age.com/6-critical-steps-responding-cyber-attack-123459644/

SOURCES:

When it comes to cybersecurity, your offensive line needs to be strong. Our team at Copper State Communications has over 35 years of industry experience. We are your trusted partner for all things business IT and communications -- including security.

35years

FOR GUIDANCE ON HOW TO CREATE A GAME-CHANGING SECURITY POLICY FOR YOUR COMPANY

CONTACT US AT

888.550.4484

VISIT US AT

COPPER-STATE.COM–OR–

On the field, there’s nothing worse than the offense dropping the ball and giving away a play. And businesses without a strong cybersecurity offensive strategy lose billions of dollars a year because

of security problems, attacks, and subsequent loss of business continuity.

The U.S. government increased its annual cybersecurity budget

this year, jumping to

$19 billion from 2016’s $14 billion.

The cybersecurity market is expected to show

12-15% year-over-year growth

through 2021.

No matter the size of your company, these threats are a real concern. Consider this:

Building a Better Cybersecurity Game-Plan

Here are a few tips to get you started down the road to a stronger security strategy:

Just like a champion football team, a comprehensive winning strategy considers both offense and defense. Likewise, to keep your data secure, your business should have

both proactive and reactive plans for potential security breaches.

ENCRYPT YOUR DATA

Hackers are looking for low-hanging fruit, so to speak. If important data is easy to access, it will be stolen. Always keep critical and sensitive data encrypted.

SECURE YOUR SYSTEMSSecure all IT systems to contain the breach, even if it means suspending a comprised section of your network -- or the network in its entirety. The cost of data restoration can be massive; minimize the impact of data loss to minimize financial loss.

INVESTIGATE THE BREACH

Your defensive line should include a technical team tasked with investigating the details of the breach, its effects on your business, and actions taken to remediate it.

SECURE YOUR DATA COMPREHENSIVELY

Anti-virus protection is non-negotiable as a basic security layer. And even if your systems include a built-in firewall, it is prudent to consider adding an additional layer of protection.

BE PROACTIVE WITH YOUR DATA AND EMPLOYEES

Make regular backups of your data. Train employees to understand their data protection responsibilities and to recognize social engineering techniques. Your data security policy should be put in writing and communicated to your entire staff.

UPDATE PASSWORDS REGULARLY

Passwords should be updated about twice a year and should use a strong mix of characters (letters, numbers, and symbols). Avoid the common mistake of writing your passwords on sticky notes.

OFFENSEHow to Prevent Cyberattacks

DEFENSEWhat to Do If You’ve Been Attacked

ADDRESS LEGAL AND REGULATORY REQUIREMENTSIn some cases, legislation contains regulatory notification requirements in the event of a breach (e.g., HIPAA and PCI compliance). Be aware of what those are and know who you need to notify after an incident.

MANAGE YOUR PR

For breaches that become public, be timely, accurate, and honest in any messages given to affected parties.