5 Ways to Make Your Cyber Security a Reality

Posted by Amber Bradley on May 27, 2016

What is a Cyber IQ?

Take the Cyber IQ test compiled by the security firm, Eset.  Companies need to continue to commit to gaining knowledge about cybercrime and technology.  Ignorance in this evolving area could be leaving data at risk.

According to the Verizon 2015 Data Breach Investigations Report (DBIR), it is estimated the financial loss from 700 million compromised records cost various industries over $400 million.  The least expensive breach was $750,000 and the single most expensive breach was $31 million, discovered Fortalice Solutions.  These are devastating and costly breaches companies cannot afford.  It’s time to get in the cyber know.

Know the Cyber Lingo

What is the difference between a security incident and data breach?  DBIR clarifies:

Security Incident: Any event that compromises the confidentiality, integrity, or availability of an information asset.

Data Breach: An incident that resulted in confirmed disclosure (not just exposure) to an unauthorized party.

A Detection Deficit is Growing

Detection Deficit is a term used to describe the time it takes for hackers to compromise a network and the time it takes for the organization to discover the hack.  According to the DBIR, 60% of attackers are able to compromise an organization within minutes, but it may take days, months, and even years for the organization to discover the breach.  The ‘detection deficit’ between attackers and cyber defenders continues to grow.

According to RiskAnalytics, 75% of attacks spread from Victim 0 to Victim 1 within one day (24 hours). Over 40% hit the second victim in less than an hour.

No Phishing Allowed

Out of 150,000 emails sent, nearly 50% of the recipients opened the e-mails and clicked on the phishing links within the first hour, DBIR findings revealed.  Phishing typically targets more of an individual rather than an organization.

If the email claims to be a financial institution wanting updated account info, contact information, or to change a password, STOP.  This is the red-flag salute of a comprise trying to take a foothold in your network.

Beware of Malware

According to DBIR, 70-90% of malware samples are unique to an organization.  Malware has a shelf-life and typically is short lived, DBIR explained.  Ninety-five percent of malware types showed up for less than a month, and four out of five didn’t last beyond a week.  Though malware events may not be long lasting, their maliciousness is.  These numbers demand smarter and more adaptive approaches to combating malware.

Calibrate a Cyber Security Solution

It appears the common the cold is no longer what is to be feared.  As a community, businesses can achieve together and unfortunately, businesses can fail together.  The Calibration Group is committed to taking action to thwart off cyberattacks and enlarge the secure perimeter of its business community.  Being a communication facilitator it is quite easy for Calibration to streamline the collective business preparedness.

Ellen Powers, The MITRE Corporation’s Information Security Awareness Program Manager, identifies companies’ most effective asset to stopping cyber breaches, “Employees, our human sensor network, detect 10% of advanced cyberattacks.”

Lance Spitzner, Training Director for the SANS Securing The Human Program, echoes Ellen’s sentiments, noting that “one of the most effective ways you can minimize the phishing threat is through effective awareness and training. Not only can you reduce the number of people that fall victim to (potentially) less than 5%, you create a network of human sensors that are more effective at detecting phishing attacks than almost any technology.”

Contact The Calibration Group today to request a customized company cyber security employee awareness program. Educated employees reduce breach costs by 76%,  Fortalice Solutions and The Calibration Group report. With Calibration’s decades of industry expertise, the employee firewall will become companies’ best line of defense against costly cyber breaches.