How Your Organization Can Avoid Getting Hacked

How Your Organization Can Avoid Getting Hacked

It seems we can’t go a single day without a new data breach making headlines.

It seems we can’t go a single day without a new data breach making headlines. A mid-year study found that between January 1 and June 30 of 2017, there were over 6 billion sensitive records exposed through 2,227 publicly noted data breaches.

In a year plagued by security woes, HBO and its executives are some of the most recent victims. Unidentified hackers broke into HBO’s systems and stole 1.5 terabytes of data including scripts, unreleased episodes and other potentially damaging information about internal ops. Some experts have postulated that the hack occurred due to out of date technology, non-existent cybersecurity protections, or unknowing employees who may not have secured their at home devices. Mandiant, the firm that investigated the Sony hack in 2014, has been brought in alongside the FBI in an effort to catch the hackers and prevent them from releasing any further proprietary HBO material.

These incidents have become so constant that they barely come as a surprise to consumers – what’s left instead is a common thread of frustration among the IT and cybersecurity communities. While the specifics of how HBO was hacked are still rumored at this time, there are some security best practices organizations should keep in mind to mitigate and prevent similar issues in the future.

Know your data

Only by understanding the data you hold can you effectively protect it. The information companies collect can significantly impact their odds of becoming a target of hacking and malicious intent. Larger companies with billions of customer data points (like Equifax) or smaller companies with weak defenses are most likely to become the victim of an attack.

 

HBO, as everyone knows, holds the most sensitive data of all – coveted Game of Thrones episodes, scripts and spoilers – which made the company a prime target. Understanding the data troves within your organization can help IT teams build stronger data protection strategies, which will help shield your company from a cyberattack.

Enhance the vendor vetting process

Since many organizations share highly sensitive information with their partners and vendors, implementing a rigorous third-party vendor risk assessment is a must. Creating a clear vendor vetting process and increasing visibility into suppliers’ cybersecurity controls will help eliminate any potential weak links in organizations’ own security protocol.

For validation of the importance of evaluating vendors on their cyber-standards, look to tech behemoths like AirBnB, Dropbox and Twitter. The four companies recently partnered to establish an industry vendor vetting standard which looks to measure suppliers’ security stability and risk. Organizations can follow in these companies’ footsteps by paying special attention to their own vendors’ security practices and processes. In many instances, understanding the technical controls and security programs of third-party vendors can be just as important as having a strong grasp of your own.

Institute continuous training and education

Many organizations make the mistake of focusing their data protection strategies on keeping the outsider out, but plenty of breaches actually stem from an insider – whether there’s malicious intent or not. This is why it’s so important to be aware of your employees’ workstyles and how your organization’s culture has impacted them.

A few questions to ask: Do your employees take it upon themselves to procure new tools or applications that make them more efficient? Do they understand why certain security controls are in place or the ramifications of sidestepping the rules? Do they care about the overall security of customer or internal data? These questions should all be core to your IT department’s culture, meaning they should bleed over into the larger organization’s culture as well.

While your IT and compliance teams may be up to date on industry-wide security standards and best practices, it’s also important to ensure employees know how to safely handle sensitive data. But don’t assume it comes naturally to anyone. Employees must be trained on everything – from what they can store on a personal computer and where they should be saving documents down to what a phishing email looks like. Education and training cannot be a once a year, top-down practice. Instead, organizations must weave best practices into the culture of the entire company.

In order to avoid the same fate as HBO, organizations must be knowledgeable about the data they hold, be vigilant in their vendor vetting processes and view security as an organization-wide initiative. By making security a core aspect of company culture, organizations will have educated employees that genuinely want to protect data, validate their vendors and keep their company from becoming the next data breach headline.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”