Author Info
Greg Lockwood is the Chief Technology Officer at USA Financial, joining the firm in 2007. He leads the teams tasked with building,...
With the number of sophisticated cyber threats continuing to increase, if you’re not yet thinking about cyber security in your organization, you are at risk.
The statistics we come across daily utterly shock and scare us, therefore we are constantly on the hunt for industry best practices that are proven to provide the best protection for you, your firm, and your customers.
Here are just a few of our motivators…
While these stats are alarming, there are seven very practical ways in which you can best protect yourself against cyber threats.
Expect attacks and know what to look out for. The only way to help fight them and lessen any negative impact they may have is through education, awareness and ultimately some common sense. Email schemes are the most utilized access point for cyberattacks. When receiving emails, scrutinize every detail using the SLAM method:
Sure, the extra step of scrutinizing your emails may feel like an inconvenience, but it will pale in comparison to the inconvenience you will experience by not paying attention to these important details.
Strong policies and procedures are not meant to act as a hindrance to business, but rather, they are in place for the protection of all. Due to the increase in email compromises (note the statistic regarding fraudulent email above) implementing protocols that build levels of protection are key.
If a distribution from an account is received electronically and includes instructions for the withdrawal to be sent to a new bank account, ensure that the request is being verbally verified with a customer, even if you were just emailing with the customer regarding the request. Cyber criminals have been known to monitor email accounts for extended periods of time as this allows the criminal the ability to understand applicable details and the history of their victim. Perhaps the customer very well plans to submit a distribution request which they have legitimately communicated to you via email; by monitoring the email account, the cybercriminal knows this and will take advantage of the opportunity, requesting funds to a different account prior to the customer sending in their legitimate request.
Without having strong procedures and specific protocols in place that add levels of verification and subsequent protection, funds could be forever lost.
First, you need to fully understand what data you are capturing, where it’s stored, whether or not it’s sensitive, and when and if it can be purged. Ensuring that data is backed up periodically and stored to a secure location that is recoverable in the case of a cyber-attack or other environmental disaster is key. Then, add data encryption to sensitive data.
Data encryption is a security method where information is encoded and can only be accessed or decrypted by a user with the correct encryption key. Encrypted data, also known as ciphertext, appears scrambled or unreadable to a person or entity accessing without permission and is actually noted as one of the biggest hacker obstacles. Encryption and other data protection methods is one in which you can enlist the help of your firm’s IT department or other security experts. However, understanding your data (e.g. what data is captured, where it is stored, whether or not it is highly sensitive, etc.) is a critical first step. It is impossible to properly protect the necessary data without understanding it completely at its core.
Utilize strong passwords like paraphrases and two-factor authentication whenever this is an option for your email and any other accounts you have. Guessing passwords has become much easier to do; therefore, implementing two-factor adds a second layer of authentication making gaining access much harder. Two-factor authentication is most often completed via an SMS text message where after you enter your username and password, you are then sent a one-time passcode via text to enter on the site in order to gain access. Even if a hacker has your username and password, without having your actual device that the code was received on they will be unable to access your account.
And be sure to never write usernames or passwords on paper or store collectively within a spreadsheet. Instead, utilize password storage programs to store this information. With enhanced password requirements and the number of accounts we all have, it is simply impossible to remember all logins; and spreadsheets and post-its aren’t an option here. Password storage programs offer a safe and logical alternative.
Ensure that sensitive data does not get into the wrong hands by:
If you aren’t protecting your device, you are opening yourself up to impersonation, ransomware, and data theft attacks.
In today’s day and age, it is common to rely on various vendors and third parties for the services and tools that they offer, but with this comes heightened risk. The large Target breach is just one of many examples in which the vulnerability actually existed at the vendor level. When deciding to work with a third party, ensure you are requesting information regarding their cybersecurity program and subsequent controls. Any company not willing to provide information is an immediate red flag and should not be considered. You need to be comfortable with the answers that are provided. Most reputable companies will have specific documentation that they can provide to you regarding their cybersecurity controls.
Having a clearly defined plan will reduce the impact of the attack should one occur. If a suspicious email is received, what do you do? If funds are successfully withdrawn from a customer’s account fraudulently, who do you inform? These questions, among the many other situations that can occur as a result of a cyber-attack, are not ones that can wait to be answered when they occur. There must be a plan that includes proper detection, escalation, and response. If you don’t have a plan, don’t wait a minute longer to put one in place. Hiring reputable experts in this area or ensuring you are working with an organization who has strong IT department with cybersecurity as a primary focus is critical.
If you can’t tell, we are passionate about cybersecurity and helping others protect themselves and their business. Contact us or give us a call today at 888-444-0125 and we’ll be happy to dive deeper into the tools and resources that make us a great partner in helping protect your business and your customers.
Greg Lockwood is the Chief Technology Officer at USA Financial, joining the firm in 2007. He leads the teams tasked with building,...