31.08.2022 Views

Cyber Defense eMagazine September Edition for 2022 #CDM

#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Encrypt data and update software regularly<br />

Data encryption is when data is translated to a unique code or language that requires a key to understand<br />

it. A password can also be used with data encryption. Even when a data breach occurs, the hackers will<br />

not be able to understand the data without the key. Your company can decide who has access to the<br />

key, which reduces the risk of hackers gaining the key and increases accountability when/if something<br />

goes wrong.<br />

Updating your software regularly will also ensure that you have the best and most reliable systems. Using<br />

older software makes your equipment vulnerable to these attacks. There are also programs that check<br />

your software to make sure everything stays up to date.<br />

Create an emergency plan<br />

Having an actionable plan in place <strong>for</strong> a potential cyber attack ensures all employees know what to do to<br />

solve the situation properly and efficiently. Being transparent and in<strong>for</strong>ming customers what could happen<br />

with their in<strong>for</strong>mation also helps the customer place trust in your company.<br />

No matter how small or large your business, you should take every step to prevent a data breach, and<br />

this includes preparing <strong>for</strong> the worst. From financial loss to reputation management, the long-term fallout<br />

of a data breach can be devastating—especially if you don’t have safeguards and a recovery plan in<br />

place. To bounce back from the possible long-term impacts of a data breach, it is important to identify<br />

what went wrong and implement policies that prevent this from happening again.<br />

About the Author<br />

Grant Gibson, Executive Vice President, CIBR Ready. He has more<br />

than a decade of experience in the cybersecurity industry and is the<br />

Chief In<strong>for</strong>mation Security Officer at CIBR Ready, a cybersecurity<br />

think tank headquartered in the Triangle. Gibson also serves as chair<br />

of National Initiative <strong>for</strong> <strong>Cyber</strong>security Education where he provides a<br />

voice of leadership to emerging <strong>Cyber</strong> technology education<br />

standards in the United States. He is a proud veteran of The United<br />

States Marine Corps, serving as a critical Communications Chief and<br />

pioneering IT instructor. Grant can be reach at<br />

https://www.linkedin.com/in/grantgibson1/ and at our company<br />

website https://cibrready.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2022</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!