Last week, I presented at MANTEC’s Business Growth Conference in Harrisburg, PA. Of particular interest to me was the keynote presentation on Cyber security. Speaker, Ron Plesco, National Lead for KPMG Cyber Investigations, shared enlightening – and intimidating – statistics about cyber security threats, the costs to business and how to protect your organization. Below are some common sense, but often forgotten, rules to implement and follow.
As connected devices increase with the Internet of Things (IoT), the threat becomes more real and personal. Hackers can gain access to employee information, personal information, and intellectual property including your secret recipes, customer and supply data, and manufacturing specifications unique to your business.
Sites like http://map.norsecorp.com/#/, show real-time cybersecurity attacks globally.
What can you do?
- Exercise Caution. The first level of defense begins at the point of entry for most users.
- Do not open emails from unknown senders.
- Do implement passwords with varying levels of complexity and update them frequently.
- Do not visit questionable websites.
Keep in mind, anything with an IP address establishing internet connectivity can be accessed.
- Document, Communicate, and Enforce corporate internet and email usage policies. Make sure your organization documents and communicates internet usage and email usage policies. Constant communication is important along with the message that the policies apply to all technology usage on company issued equipment even outside of the office.
- Be diligent. If your site gets hacked your company’s intelligence could be for sale on the black market. Use sites like pastebin.com and www.shodan.io to see if your corporate information has been breached or might already be marketed. Remember your domain is exposed anytime an employee visits external websites and submits or responds to requests for information.
- If you think you’ve been hacked, call an expert. Typically, companies may not be aware they’ve been hacked until several months have passed by. If you think your infrastructure has been compromised, you’ll need a comprehensive plan to restore confidence with your stakeholders along with new security protocols. Rely on the experts to help you identify and remedy the fraud.
Hackers are targeting corporations for valuable information. In Ron’s keynote, he reiterated that this is not limited to Big Box, Healthcare, or Government institutions. In fact, US Manufacturers are being targeted for manufacturing intellectual property that can be manipulated or reproduced overseas for competitive advantages. Partner with professionals to protect your organization. Review our blog feed for more articles on cyber security.