Understand that anyone can improve the security of a business—even if they are not a computer expert. Leadership, training, and awareness make a difference.
- [Instructor] You can do this. In just 20 minutes, you could improve the security of your business tremendously just by putting a few security features in place. You don't need a degree in computers or know how to write code to make a difference in the cybersecurity posture of your company. All you need is a desire to change behaviors and engage with those who could help. Many security tools are free and ready for you to use today. And just as you hire a plumber to fix your sink, you need a cybersecurity expert in your life to help ensure data is protected.
AT&T produced the Cybersecurity Insights Report titled Mind the Gap: Cybersecurity's Big Disconnect. One of four best practices included in that report was don't go it alone when it comes to building and maintaining cybersecurity defenses. Cybersecurity has become a team sport that requires trusted service providers and other entities. Later, I'll share no-cost resources you can start using today. However, educating yourself and staff is the first, and maybe even most important step, since criminals are using social engineering, which is nothing more than tricking someone into doing something they shouldn't, to access your network and accounts.
The Ponemon Institute conducts independent research on privacy, data protection, and information security policy, and is a leader in this field. In their 2017 cost of a data breach report, their researchers found that 79% of the companies surveyed who fell victim to ransomware identified phishing or social engineering as the method of attack. Your best defense against social engineering is education. Being here with me is a fantastic first step in your cybersecurity education.
This is a journey and I'm honored to be a part of it. You can make a difference in the security of your company.
- Physical security vs. cybersecurity
- Identifying what you have that's valuable to others
- Protecting valuable data and accounts
- Detecting a breach
- Responding to an incident in an efficient manner
- Recovering from a breach
- Technology checklists for small and medium businesses