Did you know? Cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015 which represents the largest transfer of economic wealth in history, reports Cybersecurity Ventures Annual Cybercrime Report. Unfortunately, our private data is coveted by cybercriminals, hackers and even foreign governments. Our information has tremendous value; thus we need to figure out the best ways to safeguard our data.
Technology began making human existence easier over 12,000 years ago with the creation of chipped stone tools. Since then, technology continues to provide greater means to extend our lives and enable prosperity. However, now, in this Age of Information, right alongside the rapid advancement of innovation, has evolved a new, nefarious and shape shifting threat; a modern predator to livelihood and sustainability. This predator is the information hacker.
Hackers pose a significant threat to both an organization as well as their employees. Their ill intent to gain access to proprietary information, whether for financial gain, competitive intelligence, or settling a vendetta, damages business continuity and in some instances, have devastating ramifications reaching beyond the organization.
Hacked and breached data is no longer accessed solely from a company server, but increasingly also from sources common in the home and workplace including mobile phones and Internet-connected devices such as Google Home, Alexa and Amazon Echo. Mobile devices have become much more of a target because of the wealth of information they hold and due to the blending of personal and business information. By accessing a single webcam, a cybercriminal can infiltrate an entire network, and steal consumer data. It is important to assess the number of Internet-connected devices at your company, scan your endpoints for vulnerabilities and ensure you’ve changed their default passwords. Also, ensure that they are not all connected to a single network.
Hackers are equal opportunists. Both the private and public sectors are at risk, across all industries. A breach to a hospital’s protected data could result in loss of life. At a leading university, cutting-edge research could fall into the wrong hands. Unauthorized access into a retailer’s database could open thousands of their customer’s wallets and empty their bank accounts. Even a minor hack that is quickly contained can be costly.
It is critical that organizations, regardless of whether they operate in the private or public sector ensure their employees know and practice good cyber hygiene. They must also be aware of the nefarious ways the bad guys operate and how they may be at risk. Below are helpful tips to protect your organization and your employees.
By actively implementing the above top cyber tips, servers, personal computers, mobile phones and Internet-connected devices, data will be better protected, and outside attacks will be thwarted.
About the Author:
Stevan Bernard is a security technology consultant for Allied Universal. Steve led Sony Pictures global protection services with responsibility for the CSO/CISO function, investigations and forensics, physical security, BCP, environment, medical, major events and protection, employee health and safety. Prior to this he worked in high-tech, energy and law-enforcement. His tour in the US Army included a year in Vietnam being awarded the Bronze Star. He is a Certified Fraud Examiner, has a BS degree in Criminal Justice, an AA degree in Psychology and is a graduate of the FBI National Academy.