Altszn.com
  • Home
  • Crypto
    • Altcoins
    • Bitcoin
    • Ethereum
    • Monero
    • XRP
    • Zcash
  • Web3
  • DeFi
  • NFTs
No Result
View All Result
Altszn.com
  • Home
  • Crypto
    • Altcoins
    • Bitcoin
    • Ethereum
    • Monero
    • XRP
    • Zcash
  • Web3
  • DeFi
  • NFTs
No Result
View All Result
Altszn.com
No Result
View All Result

How can a company defend against data breaches? It starts with employees

Altszn.com by Altszn.com
December 14, 2022
in Dark Web
0
How can a company defend against data breaches? It starts with employees
399
SHARES
2.3k
VIEWS
Share on FacebookShare on Twitter


It seems that companies are reporting breaches of their networks almost daily. This is because the bad guys don’t take days off. They consistently look for ways to take advantage of companies and try to steal data they can then sell on the dark web’s black market pages. From identity theft to medical fraud, to stealing loads of data, to ransomware, the one goal the threat actor tries to achieve is to make money. The cyber defenders work hard to ensure their network is secure, but there is always a hole in the defenses: the employees. People are the weakest link in any security chain, and that hole cannot be fully closed using technical measures.

In October, Bed, Bath & Beyond was hacked and the threat actors gained access to data on at least one networked computer, if not more. This breach occurred as a result of an employee clicking on a phishing email. A number of other high-profile companies recently experienced breaches as well. So, the question becomes, how do we defend against cyber threats? First, we need to realize that everyone is susceptible, no matter who they are. This means it may be only a matter of time before a company is faced with a breach. 

Second, we need to ensure there are technical measures and policies in place to limit the damage that can be done if a hacker gains access to a device. Making sure systems are patched; ensuring that people use VPNs when not on-site; and using complex passwords and multi-factor authentication are just some of the things that can be done to protect data. Companies should design their networks in a hierarchical manner, which segments sections of the company and network from other areas. This helps ensure that if a breach occurs, the damage can be limited to one section of the network.

Third, every employee must take ownership of being a good steward of company data. People are complex, multifaceted beings and, as such, they are prone to making mistakes. This is especially true when you factor in various behaviors that affect one’s cognitive ability and decision-making process. If someone is distracted, they are more likely to click on a link in a phishing email. If they are not paying full attention, the risk of becoming an open port for the hacker is high. 

The current method of defending against phishing attempts, and other social engineering attacks, is the annual information awareness training. Although this training does a great job of explaining the risks and threats, it does nothing to actually change an employee’s behavior.  Companies need to ensure there is a security-minded culture in their organization. When an employee feels as though their efforts make a difference, they are more likely to go the extra mile to protect the organization. Employees who feel responsible for the company’s data and network will work harder to protect it. They take ownership of the security posture and want to see it succeed.  

Employees also need to be emboldened to report a potential security breach, without fear of reprisal. Fear is not an effective tool in defending a network. Don’t click on links from emails you do not expect. Be suspicious of any email that comes in from outside your network.

If a breach occurs, containment is the number one priority. Containing the breach to the smallest area of the network helps limit the possible damage a hacker can inflict. Companies need to deploy tools such as intrusion detection systems (IDS) and security information and event management (SIEM) tools to help detect breaches early. The sooner a breach is detected and shut down, the less damage a threat actor can do.  

Companies need a good data backup plan to recover from an incident. Backing up to a cloud provider can allow an organization to recover from a breach faster. The best — perhaps the only — defense against ransomware is a good backup. Paying the ransom is never something a company should do. If you pay the ransom, there is no guarantee that you will get your data back. Certainly, there might be a small amount of data lost when a company recovers from a backup, but that loss is small compared to paying a ransom and then getting a key from the attacker that doesn’t work.


Developing a mastery of irregular warfare


Can America survive two more Biden years?

Companies must ensure they are hiring the right talent for their organizations. Not every information technology person knows cybersecurity, so it is important to make sure that the members of the cybersecurity team are qualified. Don’t simply throw money at the problem — that won’t fix it. Hire a qualified team, led by a qualified chief information security officer, and then follow their guidance on where to spend money and how much.

Cyber breaches are not going to stop. As long as we store our data electronically, we will have the threat of a breach. It is up to everyone on a network to ensure the network is safe by applying good information security practices every day, all day.

Henry Collier is a professor and the program director for Norwich University’s online Master of Science in Cybersecurity program.



Read More: news.google.com

Tags: breachesCompanydark webDarknetdataDefendEmployeesStarts
ADVERTISEMENT

Recent

‘Dark stablecoins’ could emerge as regulations tighten

‘Dark stablecoins’ could emerge as regulations tighten

May 12, 2025
Lido DAO initiates emergency vote to swap compromised oracle

Lido DAO initiates emergency vote to swap compromised oracle

May 11, 2025
Why Wall Street Won’t Embrace Crypto Without Zero-Knowledge Privacy

Why Wall Street Won’t Embrace Crypto Without Zero-Knowledge Privacy

May 11, 2025

Categories

  • Bitcoin (4,897)
  • Blockchain (11,517)
  • Crypto (9,458)
  • Dark Web (554)
  • DeFi (8,444)
  • Ethereum (4,964)
  • Metaverse (7,659)
  • Monero (292)
  • NFT (1,549)
  • Solana (5,072)
  • Web3 (20,862)
  • Zcash (506)

Category

Select Category

    Advertise

    Advertise your site, company or product to millions of web3, NFT and cryptocurrency enthusiasts. Learn more

    Useful Links

    Advertise
    DMCA
    Contact Us
    Privacy Policy
    Shipping & Returns
    Terms of Use

    Resources

    Exchanges
    Changelly
    Web3 Jobs

    Recent News

    ‘Dark stablecoins’ could emerge as regulations tighten

    ‘Dark stablecoins’ could emerge as regulations tighten

    May 12, 2025
    Lido DAO initiates emergency vote to swap compromised oracle

    Lido DAO initiates emergency vote to swap compromised oracle

    May 11, 2025

    © 2022 Altszn.com. All Rights Reserved.

    No Result
    View All Result
    • Home
      • Home – Layout 1
      • Home – Layout 2
      • Home – Layout 3

    © Altszn.com. All Rights Reserved.

    • bitcoinBitcoin (BTC) $ 104,447.00
    • ethereumEthereum (ETH) $ 2,557.49
    • tetherTether (USDT) $ 1.00
    • xrpXRP (XRP) $ 2.42
    • bnbBNB (BNB) $ 669.78
    • solanaSolana (SOL) $ 175.87
    • usd-coinUSDC (USDC) $ 0.999926
    • dogecoinDogecoin (DOGE) $ 0.248264
    • cardanoCardano (ADA) $ 0.827910
    • tronTRON (TRX) $ 0.269920
    • staked-etherLido Staked Ether (STETH) $ 2,552.27
    • suiSui (SUI) $ 4.19
    • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 104,438.00
    • chainlinkChainlink (LINK) $ 17.37
    • avalanche-2Avalanche (AVAX) $ 25.65
    • pi-networkPi Network (PI) $ 1.51
    • wrapped-stethWrapped stETH (WSTETH) $ 3,088.20
    • shiba-inuShiba Inu (SHIB) $ 0.000017
    • stellarStellar (XLM) $ 0.314913
    • hedera-hashgraphHedera (HBAR) $ 0.214323
    • the-open-networkToncoin (TON) $ 3.50
    • hyperliquidHyperliquid (HYPE) $ 25.21
    • bitcoin-cashBitcoin Cash (BCH) $ 415.13
    • polkadotPolkadot (DOT) $ 5.24
    • leo-tokenLEO Token (LEO) $ 8.45
    • litecoinLitecoin (LTC) $ 102.52
    • usdsUSDS (USDS) $ 0.999933
    • wethWETH (WETH) $ 2,557.71
    • moneroMonero (XMR) $ 344.32
    • pepePepe (PEPE) $ 0.000015
    • wrapped-eethWrapped eETH (WEETH) $ 2,731.22
    • bitget-tokenBitget Token (BGB) $ 4.91
    • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 0.999932
    • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 104,504.00
    • ethena-usdeEthena USDe (USDE) $ 1.00
    • whitebitWhiteBIT Coin (WBT) $ 30.28
    • uniswapUniswap (UNI) $ 7.11
    • bittensorBittensor (TAO) $ 463.74
    • nearNEAR Protocol (NEAR) $ 3.24
    • aptosAptos (APT) $ 6.03
    • daiDai (DAI) $ 1.00
    • ondo-financeOndo (ONDO) $ 1.07
    • aaveAave (AAVE) $ 222.77
    • okbOKB (OKB) $ 55.43
    • kaspaKaspa (KAS) $ 0.125557
    • internet-computerInternet Computer (ICP) $ 6.01
    • ethereum-classicEthereum Classic (ETC) $ 20.37
    • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
    • crypto-com-chainCronos (CRO) $ 0.101295
    • official-trumpOfficial Trump (TRUMP) $ 14.23
    • bitcoinBitcoin (BTC) $ 104,447.00
    • ethereumEthereum (ETH) $ 2,557.49
    • tetherTether (USDT) $ 1.00
    • xrpXRP (XRP) $ 2.42
    • bnbBNB (BNB) $ 669.78
    • solanaSolana (SOL) $ 175.87
    • usd-coinUSDC (USDC) $ 0.999926
    • dogecoinDogecoin (DOGE) $ 0.248264
    • cardanoCardano (ADA) $ 0.827910
    • tronTRON (TRX) $ 0.269920
    • staked-etherLido Staked Ether (STETH) $ 2,552.27
    • suiSui (SUI) $ 4.19
    • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 104,438.00
    • chainlinkChainlink (LINK) $ 17.37
    • avalanche-2Avalanche (AVAX) $ 25.65
    • pi-networkPi Network (PI) $ 1.51
    • wrapped-stethWrapped stETH (WSTETH) $ 3,088.20
    • shiba-inuShiba Inu (SHIB) $ 0.000017
    • stellarStellar (XLM) $ 0.314913
    • hedera-hashgraphHedera (HBAR) $ 0.214323
    • the-open-networkToncoin (TON) $ 3.50
    • hyperliquidHyperliquid (HYPE) $ 25.21
    • bitcoin-cashBitcoin Cash (BCH) $ 415.13
    • polkadotPolkadot (DOT) $ 5.24
    • leo-tokenLEO Token (LEO) $ 8.45
    • litecoinLitecoin (LTC) $ 102.52
    • usdsUSDS (USDS) $ 0.999933
    • wethWETH (WETH) $ 2,557.71
    • moneroMonero (XMR) $ 344.32
    • pepePepe (PEPE) $ 0.000015
    • wrapped-eethWrapped eETH (WEETH) $ 2,731.22
    • bitget-tokenBitget Token (BGB) $ 4.91
    • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 0.999932
    • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 104,504.00
    • ethena-usdeEthena USDe (USDE) $ 1.00
    • whitebitWhiteBIT Coin (WBT) $ 30.28
    • uniswapUniswap (UNI) $ 7.11
    • bittensorBittensor (TAO) $ 463.74
    • nearNEAR Protocol (NEAR) $ 3.24
    • aptosAptos (APT) $ 6.03
    • daiDai (DAI) $ 1.00
    • ondo-financeOndo (ONDO) $ 1.07
    • aaveAave (AAVE) $ 222.77
    • okbOKB (OKB) $ 55.43
    • kaspaKaspa (KAS) $ 0.125557
    • internet-computerInternet Computer (ICP) $ 6.01
    • ethereum-classicEthereum Classic (ETC) $ 20.37
    • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
    • crypto-com-chainCronos (CRO) $ 0.101295
    • official-trumpOfficial Trump (TRUMP) $ 14.23