(12 votes, average: 4.67 out of 5, rated)
Loading...
Truth be told, this has been a year of data breaches. And there haven’t just been ‘data breaches’, but ‘daddy’ data breaches. Gemalto reported a staggering 164% rise in data breaches in the 1st half of 2017 compared to the latter half of 2016. What’s the reason? It’s hard to put it down to one single thing when it’s a combination of many. Sophisticated techniques, higher rewards, social engineering techniques, IoT…there are countless things we could throw mud at.
However, it would be focusing upon the ‘Why’ part of the data breaches when clearly the ‘What’ part is more important. Instead of wasting our energy pondering the ‘Why’ part, we should turn our attention to preventing them from taking place in the first place and ask ourselves questions like – What can I do to prevent a data breach from happening? How do you avoid being the next victim of a data breach? Here’s how you can do it.
A recent report shows that employees act as the chief source of most cybersecurity incidents. Almost 54% of IT professionals cite employees as the main cause. That is exactly why training employees no matter what end of the spectrum they are is of uppermost importance. You should:
No hacker is after the cute cat photos that you’ve stored on your pc. Two things are certain in life — the dogs run after bones and hackers run after money. And the money lies where there is information, sensitive information to be precise. Such information may include business secrets, financial data, customers’ details, etcetera.
Many of these malware attacks are dependent upon a bug or a vulnerability in the system. The WannaCry ransomware attack is a prime example of this. That is why software companies keep rolling out updates or patches every now and then. This holds true for every software as well as the operating systems.
Patch them, latch them!
According to a study conducted by the Ponemon Institute, around 60 percent of companies that suffered a data breach had not encrypted their data. Encryption is necessary no matter how big/small your organization is.
You might be using the services of a 3rd party cloud storage provider. If you are, understand their terms and conditions carefully. Opt for a reputed cloud provider even if it means shelling out an extra few bucks. After all, it’s your business at stake here. Another important step is backing up the data. You can back up your data in the cloud or a USB drive or a hard drive. Keep in mind that the system you use to back up your data is disconnected from your business almost all of the time. This is to avoid torrid disasters. And if possible, backup at more than one place.
As discussed earlier, human mistakes are the main source of many of the unfortunate incident taking place. However, they’re inevitable. After all, we’re all humans, right? That is why there are rules in our world. If you want to protect against data breaches or any cyber-attacks for that matter, you must have proper policies in place. Policies such as password policy, exit policy, BYOD policy, vendor policy, etc. help immensely.
Let’s understand a simple logic – the lesser the data, the lesser the risk.
You must
We’re not saying that these practices will make your system impenetrable. It never has and it never will. But you must put them in practice for the same reason you use your door lock. You must latch the door, don’t you?