i3 - September/October 2019 - 49

By Scott Steinberg

Business

FO RWA R D ST R AT EG I E S

How to Protect your
Business from Cybercrime
Simple Strategies to Defend Against Disruption

 A  

s the fastest-growing business-related criminal activity,
cybercrime figures are staggering. Case in point: McAfee
Labs Threats Report: December 2018 found over 480 new
digital threats happen every minute, and nearly half of all organizations suffered data breaches or high-tech compromises in the
last year. These virtual disruptions will cost the consumer technology industry over $5.2 trillion within the next two years. Worse,
studies show it's not even hackers operating from outside your
networks who pose the greatest danger to your operations. Rather,
the biggest threat is expected to come from trusted sources -
employees, inside operators at business partners, or other users
who have an approved presence on your networks.

So how can business leaders fight back
when the number of apps, transactions
and online exchanges that need to be protected is skyrocketing daily? The answer
lies in adopting a simple philosophy called
Less Than Zero Trust thinking - where
the first rule of cybersecurity is to trust no
one, and the second is to not even trust
yourself. It also lies in adopting both lowand high-tech security practices designed
to help your organization, as well as staff
and partners, become familiar with exercising better security habits, and gaining
greater control over network interactions.

sign off on high-impact tasks allows you
to minimize human error, which is the
single biggest threat to high-tech security.
All it often takes to circumvent security
measures is one phone call to con an
unsuspecting employee into revealing
compromising information.

The High-Tech Side

Implementing a Less than Zero Trust
framework means regularly scanning all
apps, systems, solutions and devices connected to the network to ensure

compliance with corporate policy. It also
means regularly subjecting all to vulnerability and penetration testing and routinely reviewing user access privileges to
ensure that people only have access to features and systems they actually need to do
their jobs. It's also beneficial to invest in
artificially intelligent network cyber analytics tools, which use machine learning to
scan networks, determine what passes for
normal behavior and report any anomalies. Using them can automatically provide
real-time insight into what's happening on
the system. You also gain the benefit of
putting a self-improving security solution
to work that can spot potential worries in
a fraction of the time that IT pros can
immediately quarantine or stamp out
intrusions at their source when spotted.
Of course, keeping a business safe from
network and data breaches is a holistic
process that requires a culture of security
at every level and engaging in routine
activities to help you stay one step ahead.
More than anything, education and proactivity are key to a winning defense, and
encouraging employees to speak up when
they've spotted something suspicious or
fallen prey to a scam. The more your team
works together to stay on top of cyber
threats, and the tricks criminals use to
deploy them, the better off you'll be. ■
Scott Steinberg is the author of Millennial
Marketing: Bridging the Generation Gap.
Visit AKeynoteSpeaker.com.

Ikon Images/Getty Images

The Low-Tech End

Providing regular IT security training for
all staff members and using problem-solving exercises based on real-world scenarios is critical. It also means promoting a
culture of security in which employees are
skeptical of requests - especially those that
demand urgent attention or warn of dire
consequences - and take steps to verify
the validity of these requests through official channels. Likewise, greater security
can be achieved by tying multiple parties
and layers of authentication to any financial transaction or user/system update. In
effect, requiring two or more people to
C TA . t e c h / i 3

i3_0919_BUSINESS_ForwardStrategies.indd 49

SEPTEMBER/OCTOBER 2019

49

9/9/19 1:24 PM


http://www.AKeynoteSpeaker.com https://cta.tech/News/i3.aspx?Page=1

i3 - September/October 2019

Table of Contents for the Digital Edition of i3 - September/October 2019

Contents
i3 - September/October 2019 - Cover1
i3 - September/October 2019 - Cover2
i3 - September/October 2019 - Contents
i3 - September/October 2019 - 2
i3 - September/October 2019 - 3
i3 - September/October 2019 - 4
i3 - September/October 2019 - 5
i3 - September/October 2019 - 6
i3 - September/October 2019 - 7
i3 - September/October 2019 - 8
i3 - September/October 2019 - 9
i3 - September/October 2019 - 10
i3 - September/October 2019 - 11
i3 - September/October 2019 - 12
i3 - September/October 2019 - 13
i3 - September/October 2019 - 14
i3 - September/October 2019 - 15
i3 - September/October 2019 - 16
i3 - September/October 2019 - 17
i3 - September/October 2019 - 18
i3 - September/October 2019 - 19
i3 - September/October 2019 - 20
i3 - September/October 2019 - 21
i3 - September/October 2019 - 22
i3 - September/October 2019 - 23
i3 - September/October 2019 - 24
i3 - September/October 2019 - 25
i3 - September/October 2019 - 26
i3 - September/October 2019 - 27
i3 - September/October 2019 - 28
i3 - September/October 2019 - 29
i3 - September/October 2019 - 30
i3 - September/October 2019 - 31
i3 - September/October 2019 - 32
i3 - September/October 2019 - 33
i3 - September/October 2019 - 34
i3 - September/October 2019 - 35
i3 - September/October 2019 - 36
i3 - September/October 2019 - 37
i3 - September/October 2019 - 38
i3 - September/October 2019 - 39
i3 - September/October 2019 - 40
i3 - September/October 2019 - 41
i3 - September/October 2019 - 42
i3 - September/October 2019 - 43
i3 - September/October 2019 - 44
i3 - September/October 2019 - 45
i3 - September/October 2019 - 46
i3 - September/October 2019 - 47
i3 - September/October 2019 - 48
i3 - September/October 2019 - 49
i3 - September/October 2019 - 50
i3 - September/October 2019 - 51
i3 - September/October 2019 - 52
i3 - September/October 2019 - 53
i3 - September/October 2019 - 54
i3 - September/October 2019 - 55
i3 - September/October 2019 - 56
i3 - September/October 2019 - Cover3
i3 - September/October 2019 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com