Hint: it has nothing to do with hurt feelings! All businesses have sensitive, or confidential, data. To test a piece of data, ask yourself if you'd be comfortable posting it on a public website. If not, the data is sensitive—so protect it carefully.
How can you keep your insiders from becoming insider threats?
Employees and contractors have privileged access to information, meaning their actions could cause a data breach—intentionally or not. Minimize the insider threat through policies and procedures, employee education, and technology controls.
When can the convenience of mobile devices cause inconvenience for cybersecurity?
Mobile devices in the workplace are great for productivity, but can do more harm than good if they're not properly protected. Policies, training, and safeguards like passcodes and mobile device management help you mobilize your security.
How can a tidy workspace spark security?
Beyond cleanliness, removing papers from view and locking confidential printed information helps keep sensitive data secure - another reason to employ a Clean Desk Policy stating that employees clear their desks at the end of each workday.
Why is cybersecurity a BIG concern for Small Business?
Small Business faces similar threats as enterprises, and are targeted just as often. Why? They're easier to exploit and can serve as conduits into larger companies. Getting protected with an ongoing cybersecurity program is a big win for Small Business.
Are you factoring in protection beyond a password?
Two-Factor Authentication (2FA) is easy to set up, and combined with strong passwords, keeps accounts more secure. But most employees don't know it's importance or simplicity—a great opportunity to make a big difference with a little explanation.
When can relying solely on a firewall leave you up in flames?
Firewalls may block unauthorized traffic, but don't usually suspect the usual suspects. Don't get burned: remember that phishing attempts from business-as-usual sources won't be flagged by a firewall, nor will ports left open intentionally.
When does cybersecurity mean sales security?
Strong cybersecurity protects not just your company, but your customers and their data as well. Flaunt your dedication to customers' security as a benefit of working with your company over a competitor - it might just earn you some business.
One-and-done just doesn't do it for cybersecurity. What's your frequency?
Regularity is key to elevating your cybersecurity from project to program. Ensure continuous improvement with a cadence of monthly, quarterly, and yearly testing. Doing so will help to track progress and catch vulnerabilities from the start.
HR pros are culture gurus and employee relations rockstars. So how do their talents contribute to cybersecurity?
Sometimes, it's best to combat human error with Human Resources. HR is uniquely qualified to assist with human-centric aspects of cybersecurity: building policies, working with employees, training, and more. An invaluable resource all around!
It's fun to go mad for March Madness, but how can you minimize personal fouls at work?
Policies are a great way to set no-personal-use rules at work, but keeping the ball in bounds may require a referee. For added protection, consider web filtering software to control what sites employees can and can't access on company devices.
March 8th is International Women's Day! Why does cybersecurity need a #BalanceForBetter?
A 0% unemployment rate and an ongoing talent shortage means the cybersecurity field offers great opportunity for women, but also has great need. The good news? Many resources are available to inspire and educate women in all career stages.
How can you move your cybersecurity program from TBD to ASAP without DIY?
Working with an IT provider, integrator, or consultant on your cybersecurity can be less hands-on and more effective. When it comes to your cybersecurity program, don't just think about how to get started, think about who to get started with.
Are cyberattackers head over heels for your network?
Vulnerability scanning works to surface commonly exploited weaknesses at the heart of your network and systems. Scanning regularly is quick and efficient—it helps to identify and prioritize areas of need, so you can kiss security gaps goodbye.
Does your cybersecurity game plan include both offense and defense?
You don't need a Hail Mary to win at cybersecurity! Going on the offense with proactive techniques like having third-party ethical hackers test your systems helps keep your business ahead of the bad guys - right from the kickoff.
When it comes to sensitive data, is your security up in the air?
Cloud storage often makes great business sense, but it's security depends on you. Choose your cloud provider wisely and follow best practices with passwords, backups, and business policies to keep cyberattackers from snowing you in.
Cybersecurity? IT makes the difference!
Effective cybersecurity takes a joint effort between business leaders and IT. But in the end, IT is often asked to lead the conversation. Be sure to enable IT with ongoing support and resources—IT can make all the difference in the security world.
You take steps to stay healthy through cold season, but are you doing the same to keep your computer virus-free?
Just like the flu, computer viruses can wreak havoc and spread quickly. Stay in your best shape with preventative steps like regular cybersecurity health checkups, being in-the-know with threats to avoid, and leveraging protective technology.
How can you keep from dropping the ball with cybersecurity in the New Year?
New Year's resolutions are a great way to set your cybersecurity goals, and then stick to it! Having the resolve to strengthen your organization's cybersecurity posture means you'll be less likely to have to resolve a cyberattack.
You're on the lookout for the perfect gifts this holiday season, but are you also watching for holiday phishing emails?
Cybercriminals take advantage when people are busy and in a rush with quick-click phishing attacks. The holiday season is prime time for this kind of attack, so be sure to slow down, think, and verify before acting on an unexpected email.
Does that safety-first mindset you use when buying internet-connected toys include security?
Security isn't child's play. Internet-connected (IoT) sometimes collect and transmit data and personal information. Treat them with the same security-first thinking as any other device, keep privacy in mind, and use a strong password to connect.
What happens when employees use business computers for none-of-your-business activities?
Using company-owned devices for personal tasks and entertainment may seem harmless, but separation protects employees' privacy and removes opportunities for poor judgement and security mistakes. It's just good business!
A little spookiness can be fun around Halloween, but how can your team help you avoid a real cyber-scare?
Your employees can act as cyberdefenders all year round - no costume required! It starts at the top with setting expectations, fostering a culture through ongoing training and awareness, and sharing information about external risk factors.
Cyberattacks typically disrupt the flow of business, but when do they have the potential to land the nation in serious hot water?
Water is 1 of 16 critical infrastructure sectors designated as crucial to our nation’s wellbeing. It's no surprise business and government are watching these sectors for cyber threats, as they have potential to disrupt and endanger the nation.
Batter up! How does each employee on your team swing for the cybersecurity fences?
Just like baseball, cybersecurity is a team sport. Everyone has responsibilities and opportunities to be a cyber-defender. And when you bring them all together, it’s a big win for cybersecurity! Remember, practice makes perfect.
You may think about job security, but what about a job in Cybersecurity?
Reports indicate a massive need for professionals in Cybersecurity, millions of jobs over the next few years. And not just hackers: opportunities exist in just about every industry and span technology, compliancy, training, education, and more.
Is there trouble brewing in your coffeemaker when it comes to cybersecurity?
Internet of Things (IoT) devices - from coffeemakers to wireless printers, thermostats, and beyond - ride on your network and can serve as a gateway for cybercriminals. Be smart with smart devices, patch regularly and change that default factory password!
What's Your BYOD Type?
Using a personal device for work is convenient, but risky for many reasons as it mixes home and work without supervision or protection. As a first step, be sure to establish a clear BYOD (Bring-Your-Own-Device) policy and train employees to it.
We've all heard of Artificial Intelligence (AI), but did you know you can put it to work to help protect you on a daily basis?
The good thing about machine learning is that computers can be asked to understand your typical computer usage, including the programs you use, and then detect anomalies in your activity to flag potential malware or attacks on your systems.
What's your favorite kind of whale? Humpback? Blue? Killer? How about Executive?
Whale watching is a fun summer activity, but cybercriminals might be watching for a different kind of whale. "Whaling" is a specific type of personalized phishing that micro-targets upper management to earn a larger payoff.
Could an internship be the tip of the cybersecurity iceberg for your company?
You know it's important to educate employees on cybersecurity and the same goes for interns—even if they're only aboard for a few months. While not everyone is responsible for steering the ship, it's in everyone's best interest to avoid sinking the ship.
Do you feel like your head is in the sand when it comes to cybersecurity this summer?
Cyber-threats can be an overwhelming concept and tempting to ignore. Dig yourself out of a hole and take control by establishing cyber-safety plans and procedures, educating yourself and your team, and using up-to-date technology.
Hopefully, you've made it through summer without a sunburn. How can you use the same tactics to avoid getting burned by a cyberattack?
Sun protection and cybersecurity aren’t things that you can do just once. Just like you layer up with both sunscreen and clothing and reapply all day, a layered, continuous approach to cybersecurity can help you avoid a dangerous burn.
It's time to "phrase" our weak passwords! How can moving from a password to a passphrase help protect your accounts?
A “passphrase,” or multi-word phrase, makes a stronger password than the traditional one word. A stylized sentence or string of words is a great place to start. Something like “the W@ffle iron i$ Hot!” is long, unexpected, and memorable.
Recycling is great for the environment, but why is it bad practice for your passwords?
When you “recycle” passwords, or use the same password for multiple accounts, just one stolen or compromised password means a cybercriminal has access to all of your critical online accounts. Recycle plastic, not passwords!
3...2...1...Go! What is the 3-2-1 backup rule, and how can it help you win the race against ransomware?
Always have 3 copies of your data: the original and at least 2 backups, 1 of which should be stored offsite. If ransomware hits your organization, having access to clean backup data can help you get back up-and-running quickly.
Your IT rocks. But can they be expected to just roll out cybersecurity?
Security is high on IT’s radar, but IT only has so much time and budget to dedicate while fighting fires and keeping the engines running. And cybersecurity isn’t just an IT thing, it encompasses business policies, planning, and training.
What do cybersecurity and your health have in common?
Cybersecurity is a posture, not a project. Just like maintaining your health, you have to perform frequent checkups, know how to take care of yourself, and use the right tools in order to stay cyber-safe.