Subscribe
Employment Expert
No Result
View All Result
  • News
  • Career
  • Business
  • Politics
  • Insights
  • Leadership
  • Education
  • Psychology
  • Switch to…
  • News
  • Career
  • Business
  • Politics
  • Insights
  • Leadership
  • Education
  • Psychology
  • Switch to…
No Result
View All Result
Employment Expert
No Result
View All Result
Home Business

Protect Your Business from Cyberattacks with Expert Cybersecurity Tips

Larry C. by Larry C.
02.07.2024
in Business, Companies, Insights, Leadership
Protect Your Business from Cyberattacks with Expert Cybersecurity Tips
306
SHARES
2.3k
VIEWS
Share on FacebookShare on Twitter

Earlier this year, I contacted my son’s pulmonologist at Lurie Children’s Hospital to reschedule his appointment and was met with a busy tone. Then I went to the MyChart medical app to send a message, and that was down as well.

A Google search later, I discovered the entire hospital system’s phone, internet, email, and electronic health records system were down and that it was uncertain when access would be restored. The following week, it was confirmed that the outage was caused by a cyberattack. The systems remained offline for over a month, and a ransomware group named Rhysida claimed responsibility for the attack, demanding 60 bitcoins (approximately $3.4 million) in compensation for the data on the dark web.

My son’s appointment was just a routine appointment. However, when my son, a micro preemie, was an infant, losing access to his medical team could have had serious consequences.

Cybercrime is a worry for large corporations, hospitals, governments, and small businesses as well. In January 2024, McAfee and Dell released a resource guide for small businesses based on a study they conducted that revealed 44% of small businesses had been targeted by a cyberattack, with the majority of these attacks occurring within the past two years.

Humans are the weakest link

When most individuals think of cyberattacks, they envision a hacker in a hoodie sitting in front of a computer and infiltrating a company’s technology infrastructure with a few lines of code. However, that’s not typically how it happens. In many cases, individuals unknowingly disclose information through social engineering tactics like phishing links or email attachments containing malware.

“The weakest link is the human,” states Abhishek Karnik, director of threat research and response at McAfee. “The most common way organizations are breached is still through social engineering.”

Prevention: Regular mandatory employee training on identifying and reporting threats should be conducted to prioritize cyber hygiene.

Insider threats

Insider threats pose another human-related risk to organizations. An insider threat occurs when an employee with access to company information commits a breach. This individual may act independently for financial gain or be influenced by an external party.

“There’s this false sense of security when it comes to insiders, that they’re much less likely to impact an organization than some form of external attack,” says Brian Abbondanza, an information security manager for the state of Florida. “We trust that they’re not engaging in such activities, but we’ve had them complete all this paperwork, run background checks, and so forth.”

Prevention: Users should only have access to the information they require. Privileged access management (PAM) can be utilized to establish policies and user permissions, as well as generate reports on system access.

Other cybersecurity pitfalls

Beyond humans, your network vulnerabilities lie in the applications you utilize. Bad actors can gain access to confidential data or infiltrate systems in various ways. While you likely already know to avoid public Wi-Fi networks and implement strong authentication methods, there are some cybersecurity pitfalls that may be unfamiliar to you.

Employees and ChatGPT

“Organizations are becoming more aware of the information leaving the organization because individuals are posting to ChatGPT,” Karnik remarks. “You don’t want to expose your source code or company information there. Once it’s out there, you can’t control how it will be used.”

AI use by bad actors

“AI tools have made it easier for many attackers to engage in activities they couldn’t do before, such as crafting effective emails in English or another target language of choice,” Karnik points out. “Finding AI tools that can create a convincing email in the target language is simple.”

QR codes

“During COVID, we shifted from physical menus to using QR codes on tables,” Abbondanza notes. “I could easily embed a redirect on that QR code to first gather all necessary information about you, including scraping passwords and usernames from your browser, and then swiftly direct you to an unfamiliar site.”

Involve the experts

The key takeaway is for leadership to heed the advice of cybersecurity experts and proactively plan for potential issues.

“We want to introduce new applications, offer new services, and security needs to keep pace,” Abbondanza explains. “There’s often a significant gap between organization leadership and security professionals.”

In addition, addressing threats proactively with human resources is crucial. “Russia’s top attacking group can cause damage within eight minutes, but it takes me about 30 seconds to a minute to receive an alert,” Abbondanza emphasizes. “If our cybersecurity team can’t respond in seven minutes, we likely have a breach on our hands.”

Tags: BusinessCybersecurityData ProtectionTech
Previous Post

Maximize Your Success: Tips for Optimizing Your Spending to Achieve Big Wins

Next Post

Transform Your Thoughts About Money: Tips for Changing Your Beliefs

Employment Expert

© 2023 Employment Expert - Your Success Is Here.

Navigate Site

  • About us
  • Terms and Conditions
  • Privacy Policy

Follow Us

No Result
View All Result
  • News
  • Career
  • Business
  • Politics
  • Insights
  • Leadership
  • Education
  • Psychology
  • Switch to…

© 2023 Employment Expert - Your Success Is Here.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.