Cyber attacks. We’re all hearing about them; we read about them daily and many of us have experienced them. Maersk and APM Terminals were the latest.
At XELLZ we are working on not only feighting against these attacks but on training our people to signal these attempts of attack which are at the front door of our systems, the email.
Every day, they become a starker reality for all businesses and organizations – no matter the industry or size. While government, business leaders, and the media have been saying that cyber-attacks are no longer a question of if, but when, the clamor isn’t enough to minimize the harsh effects of these threats. Unfortunately for most, companies wont know they’ve been hacked until it’s too late.
As data breaches continue to surface and cyber-security incidents grow exponentially in frequency, size, and cost, going at it alone is no longer an effective option. Preparedness requires a collective accountability – an understanding that all affected entities – consumers, businesses, financial institutions, regulators, and the government – must prioritize cyber-security so that together, we can create a safer environment. Cyber security is everyone’s responsibility.
While XELLZ has a responsibility to uphold, it’s often harder for organizations to secure themselves due to lack of resources or even lack of awareness. It’s not surprising, then, that small businesses have increasingly become the main target. In fact, 71 percent of cyber-attacks occur at businesses with fewer than 100 employees. Through training and strict security protocol to our own systems we are able to keep the attacks at bay but a constant alerting attitude is a requirement to keep up with the cyber developments
1. Understand the evolving risks.
Cyber-security preparedness starts with having a complete understanding of the internal and external vulnerabilities that can affect any business, how hackers can gain entry including their different methods and motives, and how to identify points of weakness. Learn the different types of cyber fraud schemes and common threats and everything in between.
2. Develop a security policy that is ingrained into corporate culture.
Defining protocols to abide by is critical, but in order to be effective, the policy must permeate throughout every process, every decision, and the whole mentality of the organization – squarely embedded into its overall business strategy and how each employee operates. After all, your employees are the gatekeepers of your company’s information, making them the first line of defense against corporate account takeover. Educate your employees about the warning signs an safe practices
3.Pick up the phone.
Verify financial requests and confirm details by phone instead of relying on email to initiate or complete any financial transaction – whether you are dealing with your bank, vendors, clients, or employees.
Use a two-step verification process to add another layer of security to approving outgoing funds – it will help protect you from a loss.
4. Keep your software up to date.
Don’t delay updating the operating system software or firmware as well as your anti-virus software or other security applications. Up to date software will help you guard against the latest threats and keep your infrastructure secure.
5. Have an incident response plan and practice it.
Just like a fire drill, having a plan of action for responding to a cyber incident is crucial. Even more important, it should be practiced so that all your employees know exactly what to do in the event of a breach.