Please do not leave this page until complete. This can take a few moments.
10) High priority. 64% of businesses are prioritizing IT security above everything else and 80% of small and medium businesses rank IT security as a top business priority.
9) Bad news. A successful cyber-attack can damage your company reputation beyond repair including financial losses, intellectual property theft and erosion of customer confidence and trust.
8) Out of business. By 2021, cybercrime is projected to cost $6 trillion worldwide, and 50% of businesses suffering a data breach may shut down permanently, according to New York publication Cybercrime Magazine.
7) First steps. Understand the risks, prioritize them, document and communicate. Deploy malware/ransomware protection to secure your endpoints and servers. Safeguard mobile devices and control their use. Create an incident response plan; assign responsibilities to all stakeholders involved.
6) Determine how much risk your company is prepared to tolerate. Raise awareness of these risks to employees. Make it a regular agenda item and communicate regularly to ensure ownership and buy-in from management.
5) Invest in user awareness training and education to remind users of cyber-risks. IT teams can look at investing in phishing simulation tools to break bad habits involving malware-laced email, web, text and phone scams.
4) Draft an official security policy. Your overarching policy should be reviewed and communicated regularly to enforce adherence. Your policy should cover permitted device types, information types, applications, encryption and incident reporting.
3) Secure IT infrastructure. Create and maintain (with use of automated tools) an inventory of every network device, users and applications on your network. Limit privileged access to only a few users; create generic access for all others.
2) Establish timescales. Maintain devices and applications by performing regular updates and patches. Scan your infrastructure for vulnerable software and devices; plug vulnerabilities quickly as possible. (There are automated tools available).
1) Meet compliance requirements. Businesses need to be proactive and look ahead on the calendar to all incoming regulations. Better to build a foundation for future efforts than to reactively apply bandages.
Stay connected! Every business day, WBJ Daily Report will be delivered to your inbox by noon. It provides a daily update of the area’s most important business news.
Sign upWorcester Business Journal provides the top coverage of news, trends, data, politics and personalities of the Central Mass business community. Get the news and information you need from the award-winning writers at WBJ. Don’t miss out - subscribe today.
SubscribeWorcester Business Journal presents a special commemorative edition celebrating the 300th anniversary of the city of Worcester. This landmark publication covers the city and region’s rich history of growth and innovation.
See Digital EditionStay connected! Every business day, WBJ Daily Report will be delivered to your inbox by noon. It provides a daily update of the area’s most important business news.
Worcester Business Journal provides the top coverage of news, trends, data, politics and personalities of the Central Mass business community. Get the news and information you need from the award-winning writers at WBJ. Don’t miss out - subscribe today.
Worcester Business Journal presents a special commemorative edition celebrating the 300th anniversary of the city of Worcester. This landmark publication covers the city and region’s rich history of growth and innovation.
In order to use this feature, we need some information from you. You can also login or register for a free account.
By clicking submit you are agreeing to our cookie usage and Privacy Policy
Already have an account? Login
Already have an account? Login
Want to create an account? Register
In order to use this feature, we need some information from you. You can also login or register for a free account.
By clicking submit you are agreeing to our cookie usage and Privacy Policy
Already have an account? Login
Already have an account? Login
Want to create an account? Register
This website uses cookies to ensure you get the best experience on our website. Our privacy policy
To ensure the best experience on our website, articles cannot be read without allowing cookies. Please allow cookies to continue reading. Our privacy policy
0 Comments