Globally industry has seen a sharp rise in cyber-attacks since the Chinese government disclosed the spread of the coronavirus or COVID-19 within China and internationally. Especially, cyber-attacks focused on health-care systems using spear-phishing and ransomware, impersonation attacks combined with business email compromise (BEC) targeting financial systems, supply-chain cyber-attacks focused on re-directed manufacturing operations outside of China, and distributed denial of service (DDoS) cyber-attacks on the energy, hospitality, and travel industries.
With the spread of COVID-19, increased demands for information technology (IT) support services are occurring across nearly all industries, as worldwide employees, students, university faculty, and others are being asked or required to work or study remotely from their homes to reduce the spread of the virus. As a result, nation-state cyber-attack groups and criminal cyber-attack groups are taking maximum advantage to target cyber vulnerabilities in select industries, especially those most impacted by the current crisis.
Realizing that 40% or more of cyber vulnerabilities are directly linked to employee behavior, per Gartner’s latest studies, it is vital that organizations focus more on their employees via cybersecurity awareness, education, training, and use of simulations to create a stronger human firewall to protect their vital digital assets. After all, according to IBM Security’s latest findings, the average cost of a cyber data breach is now $8.2M.
Cybersecurity Top Five Tips
To reduce both the probability of a cyber-attack or significant data breach and mitigate the negative financial and reputational impacts, we offer the following cybersecurity recommendations which are clearly applicable to all industries:
- Create an organizational culture of cybersecurity – Ensure the C-Suite consistently promotes and supports all employees practicing effective cybersecurity policies, processes, and procedures via a comprehensive cybersecurity awareness, education, and training program including spear-phishing campaigns and cyber data breach table-top exercises.
- Implement advanced cyber diagnostic assessments, on a regular basis, including:
– Email Cyber-Attack Assessments
– Network & Endpoint Cyber-Attack Assessments
– Vulnerability Scanning Assessments
– Penetration Testing
– Spear-Phishing Campaigns
- Establish a Rapid Cyber-Attack Incident Response Plan – Develop and periodically test an enterprise-wide well-coordinated information system incident response plan to quickly identify, contain, eradicate, and recover from cyber-attacks.
- Conduct 24 x 7 x 365 Monitoring, Detection, & Response (MDR) – It is essential to continually monitor, detect, and respond to all cyber incidents including: email system, network, software applications, and all information system endpoints using advanced security information event management (SIEM) software, data visualization tools, automation, and artificial intelligence (AI) capabilities.
- Ensure information system resilience – Implement and periodically test an enterprise-wide business continuity plan (BCP) and disaster recovery plan (DRP).
Contact us for more information on how you can effectively implement these tips.Contact Us
On June 9, the IRS released Announcement 2022-13, which modifies Notice 2022-3, by revising the optional standard mileage ...
At the tail end of 2021, the Internal Revenue Service (IRS) released new Schedules K-2 and K-3 effective ...
This information is current as of Sunday, November 21, 2021. On Friday, November 19, 2021, after the Congressional ...
Last month, Senior Manager, Pearl Balsara was invited to speak at the 2023 FPA DFW Annual Conference in ...
We are pleased to announce the winners of the 2022 HM&M Excellence Awards. Ronna Beemer, Keith Phillips, and ...
Huselton, Morgan and Maultsby is composed of a spectacular team of individuals. During our annual What’s Happening Meeting, ...