We can’t believe October has already come and gone…which means National Cybersecurity Awareness Month has as well.
We had so much fun providing the tips & tools to help create a culture of cybersecurity within your organization. Although NCSAM is over, we wanted to leave you with a final recap so that you and your organization can keep implementing what you learned, no matter what month it is!
Week 1: If You Connect It, Protect It.
1. IoT Security: The Good, The Bad, and The Ugly
What is IoT? IoT (Internet of Things) are devices that have network connectivity, collect user data, process and analyze that data, and then return it back to the user (a giant network of connected devices).
Example: your smartphone, smartwatch, smart home appliances, printer, washer & dryer, computers, traffic lights, thermostat, baby monitor, your car Bluetooth phone system, etc.
Cybersecurity action steps to take: implement stronger security practices for your personal accounts and businesses, raise community awareness (share this post!), educate young people, and train employees on proper cybersecurity practices.
2. Smart Devices Need Smart Security
Lock Down Your Login. Make sure that your passwords are long (at least 12 characters), unique and safely stored. Additionally, use multi-factor authentication when offered.
Keep Software and Systems up to Date on Your Devices.
Own Your Online Presence. Configure the privacy & security setting on all new & existing accounts.
Week 2: Securing Devices at Home and Work.
1. Equipping Your Employees to Securely Work from Home
Use strong, complex, and unique passwords on your home router—a combination of letters, numbers, and special characters, with a minimum length of 8 characters.
Update your home router’s firmware (just as you update your other devices). Any devices connected to your home network may be compromised.
Be mindful of how your company data could be exposed during conference calls, time away from your desk, etc.
Mandate security e-learning to your workforce. During these times, it is essential to refamiliarize yourself with these security concepts and maintain daily security hygiene.
2. Creating An Inclusive, Empowering Cybersecurity Culture At Work
Identify and protect your organization’s digital “crown jewels.” Increased awareness can reduce the risk of a cyber attack by 45%- 75%.
Be able to detect incidents and have a plan for responding. Changing behavior is the second step in creating a culture of cybersecurity.
Make cybersecurity training regular, accessible, and fun. SecureABC offers relevant, engaging content through our gamification training. Managed and delivered throughout the year, not just 1x annually.
Week 3: Small to Medium-Sized Businesses & Cybersecurity.
1. Why It’s Time for SMB’s to Prioritize Cyber Security.
All organizations are at risk of a cyberattack, regardless of size. However, SMB’s often lack the training and resources to combat them—making them an excellent target for cybercriminals.
Did you know, 60% of small businesses that fall victim to a cyberattack shut down within six months after the breach (Symantec 1)?
Cybersecurity action steps to take:
- Perform a risk assessment to establish your organization’s current security posture and readiness.
- Properly equip your employees with the necessary cybersecurity tools & training.
- Cultivate a culture of cybersecurity within your organization!
2. How COVID-19 Has Affected Small Businesses Cyber Safety & What to Do About It.
The UN Security Council released information that cybercrime is up 600% since the pandemic began…and 43% of cybersecurity attacks are aimed at small businesses (Verizon data breach report).
Hackers are taking this opportunity to exploit weaknesses in the new work-from-home lifestyle most businesses have had to adopt.
For a small business, the cost of a successful cyberattack could be the death sentence.
Week 4: The Future of Connected Devices.
1.The Impact of 5G on the Average Consumer
5G = 5th generation wireless technology. Each generation has become increasingly reliable, faster, and changed our lives in small, but very significant ways.
5G will be able to handle 1,000x more traffic than today’s networks and up to 10x faster than 4G LTE. It will also be the foundation for real-time virtual reality, mass-market autonomous driving cars, IoTs, and other technology we can’t even yet imagine.
Since 5G is a conversion to mostly software networks, future updates will be software updates (similar to the current updates to your smartphone). More network capabilities = more vulnerabilities = that much more of a need for cybersecurity.
2. Industrial Revolution 4.0. Where Is It and Where Is It Going?
The Industrial Revolution 4.0, also known as Industry 4.0, uses IoT and systems to collect large amounts of data that can be used by manufacturers to analyze and improve their work.
The Smart Factory will be at the heart of Industry 4.0. The supply chain and production line will take on board information and communication technology for a huge evolution in automation and efficiency.
An exclusive report by MarketsandMarkets™ estimates Industry 4.0 market worth to be $156.6 billion by 2024.
“No company in manufacturing—or, for that matter, any industry—should attempt digital transformation without focusing on cybersecurity as a vital component of every single process and decision”
—Al Perlman, co-founder of New Reality Media, and award-winning technology journalist (Security Roundtable).
Follow us on LinkedIn and never miss a post!