Cyberattacks: Preparing for What's to Come
February 16, 2018 by Bill Rosenthal

Hacker preparing to cyber attack

Since 2013, over 9 billion data records have been lost or stolen in cyberattacks and breaches. This means that nearly 59 records are stolen every second with a total of 5 million records lost over the course of a single day. These terrifying statistics show no indication of stopping or slowing either – in fact, they have continually been in an upward trend.

With the enormous breaches of last year (especially Equifax) still instilling terror, organizations of all kinds are struggling to be able to maintain their systems while adhering to new/updated standards and regulations to help improve global security. In addition to these new regulations, what should companies be doing to help prepare themselves for the inevitable number of cybersecurity threats coming this year?

  • Prepare for the implementation of GDPR – The European General Data Protection Regulation, or GDPR, will be the biggest change in the world of compliance this year. Starting on May 25, 2018, every organization that handles the personal data of residents of the European Union will have to undergo mandatory data impact risk assessment. Data mapping will also be highly encouraged as it will show how information is used, transmitted, and destroyed at the end of its life.
  • Work to End the Silence – As we have previously written in a blog post, now is the time for the global cybersecurity community to work together to protect ourselves from cybercriminals. By sharing information and practices with the community, we will gain important insights into potential threats and how to handle them.
  • Enforce IoT Security – Internet of Things devices are still favorites for hackers, as their deployment is often prioritized over the security practices that should be put in place to protect them. The industry of IoT sadly does not necessarily have an enforcement agency that ensures that these devices are compliant with security standards or that they are secure. To avoid any further malicious attacks, it is important that IoT devices are secured and prepared to prevent attacks at their launch.
  • Keep Up with Regulatory Compliance – Companies should implement a governance, risk, and compliance (GRC) framework to ensure that all practice and procedures adhere to both internal and external policies. A framework such as this will help companies avoid compliance issues and will bring visibility to all potential risks.
  • Train Employees – It is important that your organization takes the time to ensure that your IT employees are prepared to analyze cyberthreats, design secure computing and network environments, defend their networks, and respond or investigate any incidents. With our CyberSec First Responder™ training, employees are able to take a proactive approach to security to actually prevent cyberattacks before they occur. 

How are you preparing your organization for what’s to come? Contact Logical Operations today for more information on CyberSec First Responder™ training.