SecurityWorldMarket

23/07/2022

Cyber security begins inside the business boundaries

Las Vegas, Nv (USA)

According to a new study from Acre, most businesses these days are protecting themselves with cyber security to mitigate risks posed by international internet criminals,  but the findings show that a staggering 70% of EMEA organisations have little to no risk strategies set in place to prevent insider data leaks.  Here, Acre looks at today's cyber security landscape and highlights the importance of internal cyber security training as a key part of a business cyber security strategy.

The people out in cyberspace that invade your privacy are usually the ones we prepare to protect ourselves from. Still, what if those people weren’t the only threats we need to be wary of? According to a recent report from Forrester, this is the case more often than we think. Insider threats at security firms caused 59% of data security incidents over the last year, typically consisting of accounts being misused by internal employees or business associates, resulting in data leaks that would-be online criminals are looking to take advantage of.

Suppose insider risk is such a prominent issue in the cybersecurity industry. Why are companies failing to take action against this problem? According to Forrester, around 39% of organisations experiencing trouble with insider data leaks cited a lack of budget, and 38% cited a lack of internal expertise as the reason behind insider risks in their organisations. In addition to this, 29% claimed that they do not see employees of the company as a significant threat to their company’s data, making it a bit easier to speculate why the number of organizations without a risk strategy is as high.

So it seems then, that, some organisations aren’t taking the risk of insider data leaks as seriously as they probably should, but what can we do to fix this? According to a report from Forrester, 65% of respondents cited staff training as a solution, 50% cited manual monitoring of employee activity, and 47% cited improved encryption as a potential tactic to quell insider risk.

Acre stresses the importance of education in the cybersecurity industry, not only for customers looking to protect themselves online but also for employees in the industry. By adequately educating employees and training them to manage accounts accordingly, we can all try to ensure that we remain among the cybersecurity firms with insider risk strategies that exceed expectations.

Physical and cyber security convergence

The idea of physical and cyber security convergence is not new and has been a discussion amongst industry leaders for many years. It's been proven that organisations with combined physical and cyber security operations are better prepared and more robust, enabling them to easily define risks, prevent, mitigate, and respond to threats plaguing the organisation. Convergence also allows data sharing and unified growth of security best practices across security departments.

User awareness and detection

Cyber security needs to be at the forefront to stop attacks like phishing or false authentication, and mitigate threats. Upwards of 90% of cyber security incidents are not as a result of IT infrastructure weaknesses, such as weak firewall policies, but actually as a result of a lack of employee cyber security awareness, resulting in people making ill-informed decisions in their day to day activities, and ultimately facilitating a security incident.

Best practices in an organisation include encouraging employees to view cyber security as a necessity for themselves and the organisation. Suppose the heads of the organisation care deeply about these policies. In that case, it will lead to a better overall organisational culture, and utilising cyber security solutions while promoting best practices will become the norm across the organisation.

Multifactor authentication

Acre suggests that individuals simply assigning or attempting to create passwords with letters, numbers, or characters is no longer a sustainable security option for most devices. Those seeking harm will try to crack passwords with highly sophisticated programmes and have been known to use all types of brute-force attacks to get what they want. Multifactor authentication is vital in this day and age, and its importance is not spoken about enough. Even if it can cause a bit of a setback, the amount of security it provides is well worth the minor inconvenience of two or three logins.


Tags


Product Suppliers
Back to top