Cyber Defense eMagazine September Edition for 2022 #CDM
#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Encrypt data and update software regularly<br />
Data encryption is when data is translated to a unique code or language that requires a key to understand<br />
it. A password can also be used with data encryption. Even when a data breach occurs, the hackers will<br />
not be able to understand the data without the key. Your company can decide who has access to the<br />
key, which reduces the risk of hackers gaining the key and increases accountability when/if something<br />
goes wrong.<br />
Updating your software regularly will also ensure that you have the best and most reliable systems. Using<br />
older software makes your equipment vulnerable to these attacks. There are also programs that check<br />
your software to make sure everything stays up to date.<br />
Create an emergency plan<br />
Having an actionable plan in place <strong>for</strong> a potential cyber attack ensures all employees know what to do to<br />
solve the situation properly and efficiently. Being transparent and in<strong>for</strong>ming customers what could happen<br />
with their in<strong>for</strong>mation also helps the customer place trust in your company.<br />
No matter how small or large your business, you should take every step to prevent a data breach, and<br />
this includes preparing <strong>for</strong> the worst. From financial loss to reputation management, the long-term fallout<br />
of a data breach can be devastating—especially if you don’t have safeguards and a recovery plan in<br />
place. To bounce back from the possible long-term impacts of a data breach, it is important to identify<br />
what went wrong and implement policies that prevent this from happening again.<br />
About the Author<br />
Grant Gibson, Executive Vice President, CIBR Ready. He has more<br />
than a decade of experience in the cybersecurity industry and is the<br />
Chief In<strong>for</strong>mation Security Officer at CIBR Ready, a cybersecurity<br />
think tank headquartered in the Triangle. Gibson also serves as chair<br />
of National Initiative <strong>for</strong> <strong>Cyber</strong>security Education where he provides a<br />
voice of leadership to emerging <strong>Cyber</strong> technology education<br />
standards in the United States. He is a proud veteran of The United<br />
States Marine Corps, serving as a critical Communications Chief and<br />
pioneering IT instructor. Grant can be reach at<br />
https://www.linkedin.com/in/grantgibson1/ and at our company<br />
website https://cibrready.com/<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2022</strong> <strong>Edition</strong> 85<br />
Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.