At the end of 2022, Cisco published its annual report, where the company gathered data on cyber security. The following information was shocking: 62% of companies say that they have experienced a security incident that affected their business in the last 2 years.
Technologies are rapidly transforming modern business, providing new opportunities, simplifying operational processes, and scaling functionality. However, at the same time, they bring new problems – the increasing need for cyber security. In order to anticipate and resist cyber-attacks (and, in case of defeat, to recover valuable information), companies need certain behavioral strategies and software support. This combination of analytics, prediction, data protection, and recovery ensures sustainable cyber security, which the vast majority of successful companies strive for.
Incidents of cyber security breaches
Companies that have experienced cyber security incidents have faced various types of IT threats. These include data breaches, which 51.5% of companies experienced, and system or network failures, which occurred in 51.1% of companies. It also includes incidents related to ransomware, which 46.7% of companies were unable to avoid, and denial-of-service attacks (46.6% of companies).
The listed incidents led to negative consequences directly for the companies, as well as for their partners. In this way, security incidents have affected the entire ecosystem of organizations in the business sphere. Among the main outcomes, we can highlight disruptions in the functioning of IT technologies and logistics, as well as disruptions in internal processes and long-term damage to the company’s image.
Success factors
Cisco’s report also identified 7 factors for successful cyber defense, embodied in 90% of companies from the category of sustainable businesses, which were absent in 10% of companies that do not belong to sustainable businesses. Here are these success factors:
- support of the security policy from the top management;
- developed internal safety culture;
- personnel whose main task is to respond to incidents related to cyber security;
- the quick and simplified transition from local to cloud storage;
- implementation of the Zero Trust model;
- clear solutions for detecting and responding to cyber threats;
- creation of secure access cloud services.
Results of the research
The results of the study indicate that the security of even the largest corporations is closely related to the human factor, namely the efforts of all employees and the presence of a corporate culture in the field of cyber security. Therefore, the conscious actions of each person affect the success of the entire operating mechanism. That’s why simple digital security rules are so important.
Digital security rules in the workplace
The basic rules of corporate and personal cyber security include the following:
- Be aware of the threat of phishing attacks. Never be 100% sure that a link in an email you receive does not lead to a malicious website. Especially if the letter refers to an unprecedented incident or threat that requires an immediate response. Remember that banks, e-wallets, and other resources cannot ask for your confidential information, card number, or account details.
- You probably know by now that every internet user is known by their IP address. So, “how do I hide my IP then?” you may ask. For this, use a VPN. This will mask your IP address and encrypt all internet traffic. This simple service will help protect you from hacking, accidental leaks, or data theft, as well as bypass regional restrictions, block ads, and more, depending on the VPN service you choose.
- Follow the most straightforward security rules: close program windows when you leave your workplace, lock your computer during your lunch break and turn it off at the end of the day. Do not open unknown external drives, do not keep recorded passwords in a visible place, and disconnect your device from the local network in case of a threat.
- Use anti-virus software and install updates regularly. Each update contains fixes for bugs and system vulnerabilities that hackers can access your data through, so timely software updates are a must.
- Set strong passwords and use a password manager. Not only does it remember passwords for you, eliminating the need to keep everything in your head, but it also chooses solid and complex passwords for each of your accounts.
- Compliance with these simple rules by employees is the basis of every company’s cyber security.
Jessica is engaged in brand exposure at LandscapeInsight. She brings forth content that helps both the reader and brands based on research and trends. You can reach Jessica at –[email protected] or on Our website Contact Us Page.