Maximize your protection, eliminate business risks.
Optimize and modernize with cloud transformation.
Empower your people to work securely from anywhere.
Let us handle IT so you can focus on growing your business.
Get multichannel 24/7/365 expert end-user support.
Stay ahead of attacks with 24/7 protection and monitoring.
Maximize uptime with with industry-leading DRaaS.
Improve efficiency, productivity and outcomes with cloud.
Ensure all mobile devices, everywhere, are secure.
Gain a competitive edge with strategic IT solutions.
This battle-tested checklist enables your team to swiftly initiate a ransomware response.
IT for businesses of all sizes, in any industry.
Empower institution growth with custom IT solutions.
Ensure your firm is always in compliance.
Improve patient care and staff morale.
Deal with pressing legal matters, not IT.
Keep up with the evolving digital landscape.
Focus on your mission by outsourcing IT.
Accelerate PE client deals and secure data.
Leverage your technology as a strategic asset.
Execute initiatives and develop IT strategies.
Get the latest industry insights and trends.
Join us at events in person and online.
Hear from clients and learn more about strategic IT.
See how Dataprise can make IT your greatest asset.
Get informative technical resources from IT experts.
Stay on stop of emerging cybersecurity threats.
Discover the key areas of DR your organization needs to address to ensure downtime is minimized.
Gain a strategic asset by bringing harmony to IT.
Ensure 24/7 support and security with dedicated teams.
Drive business forward by partnering with Dataprise.
Meet our one-of-a-kind leadership team.
Discover the recognition Dataprise has earned.
Help us help businesses with strategic IT.
Embracing different perspectives and backgrounds.
Find a Dataprise location near you.
Dataprise is committed to empowering more women to consider a career in technology.
Posts
By: Tim Foley
Table of content
Cyber security threats and attacks aren’t going away any time soon, so if you haven’t taken action to beef up your cyber security strategy, now is the time. Although you may have basic strategies in place (e.g., anti-virus software, firewalls), cyber criminals continually develop new ways to crack through these protections. To keep your business and customers safe, you need to continually evolve your strategies and ensure cyber security is a priority.
Still not convinced? According to a recent study, ransomware attacks more than doubled from 13% in 2016 to 27% in 2017, and virtually all sampled companies experienced attacks related to viruses, worms, and/or trojans.
Additionally, a study conducted by CyberSecurity Ventures showed that by the end of 2019, ransomware is expected to attack a business every 14 seconds and exceed $11.5 billion globally in damages. These costs include lost productivity, post-attack disruption to the normal course of business, forensic investigation, and damage (or loss) of data just to name a few.
Cyber security is much like the tumultuous relationship between the Road Runner and Wile E. Coyote. The Road Runner (your business) is always racing to stay ahead of Wile E. Coyote (a cyber criminal) who strategically uses ACME-brand booby traps (e.g., malware, phishing, trojans) to catch his prey. However, in the case of cyber security, the Coyote is not dimwitted and clumsy; he’s strategic, patient, and often victorious.
So, what can you do today to avoid the myriad of traps that lay ahead of you in the road?
Your staff accounts for the largest attack surface in your organization, so it is extremely important to train them on their role in preventing and containing incidents. They are the “human firewall” in your organization, and training them is an easy way to quickly boost your security posture.
Attackers search for vulnerable default settings and electronic holes in firewalls, routers, and switches to penetrate defenses. They exploit flaws in these devices to gain access to networks, redirect traffic on a network, and intercept information while in transmission. Ensure your external-facing hardware is configured to best practices and is running the latest patches and firmware. And, if any of these devices in your network are more than 3-5 years old, or not covered under current manufacturer support, it may be time to replace them.
Although it’s not directly related to actively protecting your environment, a robust backup solution ensures you can return to work faster in the event of a cyber infection. Establishing multiple restore points (both on- and off-site) and retaining backups for 14 or more days helps prevent the risk of significant data loss if an attack like WannaCry is successful in your environment.
Although anti-virus software is a must in every environment, it doesn’t catch all threats. Consider implementing a behavioral-based solution like Advanced End-Point Detection and Response. This solution can detect and eliminate threats in real-time using Deep Learning modules and heuristic algorithms that detect malicious behaviors by comparing them against normal process operations.
Conducting annual assessments ensures that all potential gaps or flaws within your environment are closed before they can be exploited by attackers. There are a multitude of assessments you can conduct in your environment including:
Cyber security threats are very real and will only increase with time. That’s why it’s extremely important to be proactive and make cyber security a top priority in your business. Taking even one of these 5 steps will help prepare your business to defend itself against potential threats, so why not start today?
INSIGHTS
Subscribe to our blog to learn about the latest IT trends and technology best practices.