How Your Organization Can Avoid Getting Hacked

How Your Organization Can Avoid Getting Hacked

It seems we can’t go a single day without a new data breach making headlines.

It seems we can’t go a single day without a new data breach making headlines. A mid-year study found that between January 1 and June 30 of 2017, there were over 6 billion sensitive records exposed through 2,227 publicly noted data breaches.

In a year plagued by security woes, HBO and its executives are some of the most recent victims. Unidentified hackers broke into HBO’s systems and stole 1.5 terabytes of data including scripts, unreleased episodes and other potentially damaging information about internal ops. Some experts have postulated that the hack occurred due to out of date technology, non-existent cybersecurity protections, or unknowing employees who may not have secured their at home devices. Mandiant, the firm that investigated the Sony hack in 2014, has been brought in alongside the FBI in an effort to catch the hackers and prevent them from releasing any further proprietary HBO material.

These incidents have become so constant that they barely come as a surprise to consumers – what’s left instead is a common thread of frustration among the IT and cybersecurity communities. While the specifics of how HBO was hacked are still rumored at this time, there are some security best practices organizations should keep in mind to mitigate and prevent similar issues in the future.

Know your data

Only by understanding the data you hold can you effectively protect it. The information companies collect can significantly impact their odds of becoming a target of hacking and malicious intent. Larger companies with billions of customer data points (like Equifax) or smaller companies with weak defenses are most likely to become the victim of an attack.

 

HBO, as everyone knows, holds the most sensitive data of all – coveted Game of Thrones episodes, scripts and spoilers – which made the company a prime target. Understanding the data troves within your organization can help IT teams build stronger data protection strategies, which will help shield your company from a cyberattack.

Enhance the vendor vetting process

Since many organizations share highly sensitive information with their partners and vendors, implementing a rigorous third-party vendor risk assessment is a must. Creating a clear vendor vetting process and increasing visibility into suppliers’ cybersecurity controls will help eliminate any potential weak links in organizations’ own security protocol.

For validation of the importance of evaluating vendors on their cyber-standards, look to tech behemoths like AirBnB, Dropbox and Twitter. The four companies recently partnered to establish an industry vendor vetting standard which looks to measure suppliers’ security stability and risk. Organizations can follow in these companies’ footsteps by paying special attention to their own vendors’ security practices and processes. In many instances, understanding the technical controls and security programs of third-party vendors can be just as important as having a strong grasp of your own.

Institute continuous training and education

Many organizations make the mistake of focusing their data protection strategies on keeping the outsider out, but plenty of breaches actually stem from an insider – whether there’s malicious intent or not. This is why it’s so important to be aware of your employees’ workstyles and how your organization’s culture has impacted them.

A few questions to ask: Do your employees take it upon themselves to procure new tools or applications that make them more efficient? Do they understand why certain security controls are in place or the ramifications of sidestepping the rules? Do they care about the overall security of customer or internal data? These questions should all be core to your IT department’s culture, meaning they should bleed over into the larger organization’s culture as well.

While your IT and compliance teams may be up to date on industry-wide security standards and best practices, it’s also important to ensure employees know how to safely handle sensitive data. But don’t assume it comes naturally to anyone. Employees must be trained on everything – from what they can store on a personal computer and where they should be saving documents down to what a phishing email looks like. Education and training cannot be a once a year, top-down practice. Instead, organizations must weave best practices into the culture of the entire company.

In order to avoid the same fate as HBO, organizations must be knowledgeable about the data they hold, be vigilant in their vendor vetting processes and view security as an organization-wide initiative. By making security a core aspect of company culture, organizations will have educated employees that genuinely want to protect data, validate their vendors and keep their company from becoming the next data breach headline.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

  • Elevating Security

    Willis Tower, an iconic symbol in Chicago for more than 50 years, has undergone significant transformations to become a modern workplace and community hub that delivers the best experiences for its tenants, area residents and visitors. Originally known as Sears Tower, it was renamed Willis Tower after a change in ownership in 2009. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3