How Your Organization Can Avoid Getting Hacked

How Your Organization Can Avoid Getting Hacked

It seems we can’t go a single day without a new data breach making headlines.

It seems we can’t go a single day without a new data breach making headlines. A mid-year study found that between January 1 and June 30 of 2017, there were over 6 billion sensitive records exposed through 2,227 publicly noted data breaches.

In a year plagued by security woes, HBO and its executives are some of the most recent victims. Unidentified hackers broke into HBO’s systems and stole 1.5 terabytes of data including scripts, unreleased episodes and other potentially damaging information about internal ops. Some experts have postulated that the hack occurred due to out of date technology, non-existent cybersecurity protections, or unknowing employees who may not have secured their at home devices. Mandiant, the firm that investigated the Sony hack in 2014, has been brought in alongside the FBI in an effort to catch the hackers and prevent them from releasing any further proprietary HBO material.

These incidents have become so constant that they barely come as a surprise to consumers – what’s left instead is a common thread of frustration among the IT and cybersecurity communities. While the specifics of how HBO was hacked are still rumored at this time, there are some security best practices organizations should keep in mind to mitigate and prevent similar issues in the future.

Know your data

Only by understanding the data you hold can you effectively protect it. The information companies collect can significantly impact their odds of becoming a target of hacking and malicious intent. Larger companies with billions of customer data points (like Equifax) or smaller companies with weak defenses are most likely to become the victim of an attack.

 

HBO, as everyone knows, holds the most sensitive data of all – coveted Game of Thrones episodes, scripts and spoilers – which made the company a prime target. Understanding the data troves within your organization can help IT teams build stronger data protection strategies, which will help shield your company from a cyberattack.

Enhance the vendor vetting process

Since many organizations share highly sensitive information with their partners and vendors, implementing a rigorous third-party vendor risk assessment is a must. Creating a clear vendor vetting process and increasing visibility into suppliers’ cybersecurity controls will help eliminate any potential weak links in organizations’ own security protocol.

For validation of the importance of evaluating vendors on their cyber-standards, look to tech behemoths like AirBnB, Dropbox and Twitter. The four companies recently partnered to establish an industry vendor vetting standard which looks to measure suppliers’ security stability and risk. Organizations can follow in these companies’ footsteps by paying special attention to their own vendors’ security practices and processes. In many instances, understanding the technical controls and security programs of third-party vendors can be just as important as having a strong grasp of your own.

Institute continuous training and education

Many organizations make the mistake of focusing their data protection strategies on keeping the outsider out, but plenty of breaches actually stem from an insider – whether there’s malicious intent or not. This is why it’s so important to be aware of your employees’ workstyles and how your organization’s culture has impacted them.

A few questions to ask: Do your employees take it upon themselves to procure new tools or applications that make them more efficient? Do they understand why certain security controls are in place or the ramifications of sidestepping the rules? Do they care about the overall security of customer or internal data? These questions should all be core to your IT department’s culture, meaning they should bleed over into the larger organization’s culture as well.

While your IT and compliance teams may be up to date on industry-wide security standards and best practices, it’s also important to ensure employees know how to safely handle sensitive data. But don’t assume it comes naturally to anyone. Employees must be trained on everything – from what they can store on a personal computer and where they should be saving documents down to what a phishing email looks like. Education and training cannot be a once a year, top-down practice. Instead, organizations must weave best practices into the culture of the entire company.

In order to avoid the same fate as HBO, organizations must be knowledgeable about the data they hold, be vigilant in their vendor vetting processes and view security as an organization-wide initiative. By making security a core aspect of company culture, organizations will have educated employees that genuinely want to protect data, validate their vendors and keep their company from becoming the next data breach headline.

Featured

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3