To protect your home from an intruder you make sure your doors and windows are all locked and secured. You might go further: build a fence around the perimeter, perhaps even get an angry-looking dog to stand guard.
But there’s no point going to all that effort if someone’s already broken in and set up camp in the basement.
Yet that’s the security policy of thousands of big businesses trying to protect their data from cyber criminals.
They do many of the right things. They invest in security software. They take a strong, multi-layered approach to security – including all the things we recommend, like multi-factor authentication, encryption, reliable backup systems and staff training.
But they don’t pay enough attention to detection and response. That involves constantly scanning systems for any sign that a crook may have gained entry somewhere, and having a process to stop an attack in its tracks.
A new study shows that only a third of businesses place detection as their main priority, while two thirds say prevention is their primary focus.
That means, they could be building 10-foot walls around their systems with intruders already inside.
In-house security teams might be super-confident in the security measures they’ve put in place. But the data suggests that they’re being too complacent. The study reveals that more than eight in ten businesses experienced more than one data breach last year – even with good security in place.
Criminals are constantly finding ways to evade security. That tells us that we need to take a rounded approach, with strong prevention AND detection policies providing the best protection against today’s determined criminals.
If you need world-class security, get in touch today.
Published with permission from Your Tech Updates.
Our 5 Reasons Why You Should Move Your Business to the Cloud
Have you ever heard of cloud computing? You may have been told to move to the cloud and are now wondering why you should do…
How COVID-19 Confirmed the Importance of a Business Continuity Plan
Business owners didn’t see the global health pandemic coming, just like most of the rest of the population. People were sceptical in the early days…
What Should Be Included In A Cyber Incident Response Plan
Protecting your business against cyberattacks involves ensuring that you have in place the different security layers including protecting the network, patching applications, protecting the endpoints,…
Tech Strategies to Extend Innovation & Growth
It is no secret that improved technology can drive growth and innovation within a company. There are many, many options that can support and lead to that growth. In this blog we will zero in on a couple that any business can use to take their company to the next level.
Are you using Teams to share sensitive data?
Microsoft Teams has fast become one of the most useful business tools for the way we work today. No matter where your people work from,…