The Cybersecurity Weak Links That Every Executive Should Know
April 9, 2018 by Bill Rosenthal

Chain made of binary code breaking

Last year was a rough one in the world of cybersecurity. Between WannaCry, Petya, NotPetya, and BadRabbit (just to name a few), companies and IT departments have been left scrambling to try and prevent cyberattacks like these from happening again. Executives need to know that data breach liability that affects the customers leads directly to the c-suite level. Additionally, they must personally be aware of the strength of their cyber defenses and what should happen if a cyberattack should occur. According to a study conducted by BAE Systems, an astonishing 40% of executives admitted that they lacked a full understanding of the cybersecurity protocols within their own company.

This misalignment between business executives and the technical officers who are experiencing threats on a day-to-day basis can cause a fissure in overall cybersecurity measures. This can then leave your business open to dangerous threats. What can c-suite executives do to help prevent potentially devastating hacks and breaches from happening? 

  • Ensure that the full c-suite of executives is communicating openly with the information technology team about the security threats and risks that are active issues for your organization. Failure to identify threats and deal with them appropriately will cause big problems. Executives should take the time to understand exactly what protocols are currently in place and where they fall short, and should also consider instituting an annual security assessment to figure out your company’s exact residual risk.
  • Analyze your company to figure out where your biggest risks are located. For most, this is found in the employees themselves. The only way that executives can make sure that their employees are not the weak link is by implementing a company-wide training program. At Logical Operations, we designed our CyberSAFE training and certification program to teach all company employees how to identify the main risks associated with end-user technology, as well as how to safely protect their data and their company’s data online.
  • Put together a company-wide action plan that is formulated before a breach so that the entire staff knows exactly what to do should a cyberattack occur. This plan should be tested and shared on a regular basis.
  • Your security team should know that they cannot have a “working hours only” mentality. The lag time between a breach and the discovery of it is approximately 200 days, which means that hackers would have ample time to steal your information. Cybersecurity should be thought of just like physical security – a 24/7 job.

As a company executive, one of the best things that you can do for your organization is arm your employees with the knowledge and skillset required to deal with a cyber-attack through training.

To learn more about our full security training portfolio or other ways to protect your organization, contact us.