Page 112 - Cyber Defense eMagazine September 2023
P. 112
the latest mobile cybersecurity threats are so important. All employees should be instructed on best
practices, such as using strong passwords, employing two-factor authentication, and being on alert to
report any suspicious emails, texts or other suspect activity so that it doesn’t spiral into a full-on
cyberattack.
3. Make career training a top priority for you and your team: Educating employees outside of the IT
and security department is important, but it’s just as important that security professionals stay up to date
on the latest cybersecurity threats and attacks, especially when it comes to mobile security.
Cybercriminals are rapidly advancing their capabilities and sharing what they know with fellow hackers
in underground forums. It’s insufficient to simply monitor your business’ network and systems, even with
advanced security technology. Expert cybersecurity professionals and CISOs must also keep abreast of
emerging threats, follow recommended mitigations from industry analysts and national agencies, and
even monitor the dark web to preempt cyberattackers’ ever-evolving exploitation efforts.
4. Monitor network traffic: At large enterprises, most security teams already monitor their organization’s
network traffic. But small- and mid-size businesses may lack the personnel to actively analyze all network
activity. That’s why it’s vital to automate detection and response efforts with a security solution that
includes mobile protection capabilities. An automated detection and response system that can integrate
into your existing cybersecurity tools enables you to have complete visibility and monitor any threat alerts
in real-time.
5. Develop and practice a solid Incident Response Plan: Your company’s Incident Response Plan is
among any security team’s most important pieces of documentation. It should serve as a playbook for
any cybersecurity threat or attack, defining in detail the actions everyone on your team — as well as the
business at large — should take if the corporate network is breached. If employees are conducting
business on mobile devices, the plan should outline response protocol for mobile-specific attacks. An
Incident Response Plan not only ensures you and your team are prepared, it provides a roadmap to
investigate how the attack happened, contain and remediate the threat, and avoid future attacks. It’s
important to review and rehearse your Incident Response Strategy on a quarterly, or even monthly, basis,
so that, should you have to use it, the information is updated and aligns with your most recent security
policies and protocols. You can also take advantage of battle-tested templates to customize an effective
template for your organization’s unique needs.
The future of cybersecurity is centered on a business’ ability to protect mobile devices.
Last year, McKinsey reported a 15% increase in cybercrime costs, with 85% of small and midsize
enterprises looking to increase security spending in 2023. The research firm listed the increase in “on-
demand access to ubiquitous data and information platforms” as the top cybersecurity trend with large-
scale implications.
“Mobile platforms, remote work, and other shifts increasingly hinge on high-speed access to ubiquitous
and large data sets, exacerbating the likelihood of a breach,” according to the report, “Companies are
not only gathering more data but also centralizing them, storing them on the cloud, and granting access
to an array of people and organizations, including third parties such as suppliers.”
Cyber Defense eMagazine – September 2023 Edition 112
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.