Page 68 - Cyber Defense eMagazine April 2023
P. 68
• Good Cyber Hygiene Pays off
Always make sure that your company follows good IT and cyber hygiene practice to keep all your systems
and data safe. Also, remember that when an IT system reaches its ‘end-of-life’, its manufacturer or vendor
no longer supports them thus, leaving them vulnerable to attacks. So patch now or pay later!
Did you know?
The infamous ‘Log4j Vulnerability’ has been giving sleepless nights to IT and security experts worldwide
since its discovery (2021).
• Don’t ignore Endpoint Security
When IT systems are removed or shut down from a network, they still tend to have personal information
stored in them. To remove the data, these systems need to be ‘wiped’ before being discarded. This is
where it counts to have a strong and unified endpoint management and extended detection and response
(XDR) system in place.
• No Company is Immune!
Understand that any organization irrespective of its size is prone to cyber attacks. This is why you as a
‘CEO’ ought to assess the types of cyber risks your company faces and how those threats would impact
your organization. CEOs when better understand these risks, can better tackle the impact and mitigate
risks.
• Security is not IT Issue Alone!
It is important for CEOS to understand that cyber security isn’t just an IT issue, but a business issue. In
fact, it is everyone’s responsibility in an organization. While your security/IT teams hustle to up your guard
against potential attacks, it is the responsibility of every stakeholder in the company to stay vigilant. If a
company’s information is compromised post an attack, it could lose customer trust affecting the brand’s
reputation followed by a legal suit. This is why it counts to have a strong managed identity and access
management solution in place, which will not only help deploy the right layers of security, but will also
bring in intelligent and context -based access decisions coupled with risk-based authentication.
Did you know?
Over 70% of enterprise data breaches involve insider attacks often executed by rogue or disgruntled
employees.
68