Cybersecurity First Aid Kit
Vendor security practices need to be considered during
the routine cyber risk assessment as well. Companies
often share information with their vendors and third
parties electronically, and this exchange has been
shown to be vulnerable to cybersecurity incidents.
When meeting with a new vendor or third party,
companies should include that vendor’s cybersecurity
protocols in the conversation. If a vendor’s cybersecurity
approach is not well-developed, then data exchanged
with that vendor are more vulnerable to risk. The
company should consider implementing controls to
compensate.
Social engineering exercises are also recommended.
In many cases, companies’ weakest security link is
protection against internal threats.
An organization’s
cybersecurity awareness can help reduce the threat
of someone within the organization accidentally or
intentionally allowing unauthorized access to valuable
information. Employees at all levels should be aware of
some of the common unauthorized entry points to the
organization’s electronic data and what they can do to
prevent a breach from occurring.
The Best Defense is a Good Offense
The current environment indicates that companies
should not consider unauthorized access to data an
“if”; rather they should approach it as a “when.” Having
a proactive, robust plan in place can help minimize
the potential damage from a breach and get your
organization back on track more quickly in the wake of
a disruptive event. Don’t go at it alone.
Five Ways to Be Proactive
with Cybersecurity
1.
Accept that security will be compromised
2. Consider cyberliability in all activities
3. Focus on critical information assets
4.
Be prepared to respond
5. Get the basics right
Once the primary vulnerabilities and risks have been
ranked, companies need to implement robust control
activities to ensure that the organization operates
as it should and high-value data are protected.
Cybersecurity-related activities should include logical/
physical access controls, change management
procedures, network monitoring, vulnerability
assessments and penetration testing, mobile device
strategy, incident response planning, anti-virus
monitoring and user training. The more control
activities in place, the more likely it is that risks will be
mitigated.
1-866-956-1983 • www.cbiz.com/cybersecurity
@CBZ
company/cbiz
© Copyright 2016.
CBIZ, Inc. NYSE Listed: CBZ. All rights reserved.
5
.