{"id":140748,"date":"2018-02-23T13:42:39","date_gmt":"2018-02-23T19:42:39","guid":{"rendered":"https:\/\/ccbtechnology.com\/?p=139611"},"modified":"2024-05-06T07:46:21","modified_gmt":"2024-05-06T07:46:21","slug":"cybersecurity-business-plan","status":"publish","type":"post","link":"https:\/\/ccbtechnology.com\/cybersecurity-business-plan\/","title":{"rendered":"Cybersecurity Business Plan: 5 Steps for Preventing Malicious Attacks"},"content":{"rendered":"<p>I\u2019m sure you\u2019re familiar with the phrase \u201cthere\u2019s a first time for everything!\u201d Well, I can think of at least 300 different things I never want to have a first for, like:<\/p>\n<p style=\"padding-left: 30px;\"><strong>1.<\/strong> Crash a canoe on the Cahulawassee River. (You\u2019ve seen the movie \u2018Deliverance\u2019, right?)<br \/>\n<strong>2.<\/strong> Walk barefoot uphill both ways (as my Grandparents had to).<br \/>\n<strong>3.<\/strong> Manage former President Trumps Twitter feed.<br \/>\n<strong>4.<\/strong> Check my bank account using open Wi-Fi in North Korea.<br \/>\n<strong>5.<\/strong> I\u2019ll stop there\u2026<\/p>\n<p>I recently added several things to my list of \u2018never want to\u2019 at the Security IT Roundtable we hosted for C-Level executives last week. Learning that <a href=\"https:\/\/www.youtube.com\/results?search_query=how+to+send+malware\" target=\"_blank\" rel=\"noopener\">YouTube<\/a> can walk anyone through tactics for malware distribution made me just about quit using the internet.<\/p>\n<p>According to <a href=\"https:\/\/www.av-test.org\/en\/statistics\/malware\/\" target=\"_blank\" rel=\"noopener\">av-test.org<\/a>, there are over 450,000 new malicious programs every day. Now add that to the 40,700 search results on how to spread malware and you\u2019ve got yourself an eventful weekend in mom\u2019s basement.* To be fair, not all hackers are looking to ruin your life, some are just interested in the <a href=\"https:\/\/www.nbcnews.com\/tech\/tech-news\/hackers-were-able-breach-then-rick-roll-voting-machine-within-n788001\" target=\"_blank\" rel=\"noopener\">practical joke side of things<\/a><strong>. <\/strong><\/p>\n<p>*Only unethical hackers live in their mom\u2019s basement<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-163002\" src=\"https:\/\/ccbtechnology.com\/wp-content\/uploads\/2018\/02\/5-1-youtube-malware-cybersecuritybusinessplan-300x78.jpg\" alt=\"\" width=\"800\" height=\"208\" srcset=\"https:\/\/ccbtechnology.com\/wp-content\/uploads\/2018\/02\/5-1-youtube-malware-cybersecuritybusinessplan-300x78.jpg 300w, https:\/\/ccbtechnology.com\/wp-content\/uploads\/2018\/02\/5-1-youtube-malware-cybersecuritybusinessplan-768x200.jpg 768w, https:\/\/ccbtechnology.com\/wp-content\/uploads\/2018\/02\/5-1-youtube-malware-cybersecuritybusinessplan.jpg 800w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>To make my skin crawl just a little bit more, one of the presenters at our Security Roundtable event showed the group a real-time demonstration of how he could control the Wi-Fi traffic using a specific, readily available (unfortunately), hacking device. The takeaway here is that the tools exist to capture any information you put across a public or open Wi-Fi.<\/p>\n<p>Some may think, \u201cNo big deal, I don\u2019t use public Wi-Fi.\u201d It\u2019s not just open Wi-Fi \u2013 any device that connects to these unsecure networks and then re-enters your business <em>could <\/em>be carrying malware right in the front door.<\/p>\n<p>What does this mean when you are traveling or frequenting your favorite coffee shops with your business device? Should we be nervously checking for Mr. Robot sitting in the corner? Unfortunately, no single magic formula exists for cybersecurity. The best defense an organization can implement to stop malicious attacks is a cybersecurity business plan with multi-layered protection that fits their specific organization. One size does not fit all.<\/p>\n<h3><strong>Here are five steps to take when developing your cybersecurity business plan:<\/strong><\/h3>\n<h3><strong><br \/>\n1. The conversation starts with your IT team<\/strong><\/h3>\n<p>Company management and IT should be engaging in discussions about cybersecurity strategy and what is being done to protect their company. Targeted questions are key, but think interview vs. interrogation. Both involve questions and seeking clarity but there\u2019s a difference in motive. Interviews get people to open up so learning happens. Interrogations assume blame and put people on the defensive.<\/p>\n<p>If you\u2019re the manager asking questions, set the stage by being candid about the importance of the IT staff\u2019s role in keeping the company safe and your desire to understand what is being done. This approach will uncover ways that you can work together to make your IT security better. If you were on the IT side, this would be a great time to let management know all that you are doing to protect the company\u2019s interests.<\/p>\n<p>Here\u2019s a great set of <a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/4110190\/PDFs\/Security-questions-to-ask-IT.pdf\" target=\"_blank\" rel=\"noopener\">Security Conversation Starters<\/a> CCB has put together to help our customers have those deeper discussions. Ambiguity will fuel annoyance and insecurity, so clearly state your intent and objectives to disarm conversational landmines. Frame the questions specifically around the information needed and be prepared to share and listen sincerely.<\/p>\n<h3><strong>2. Hire an intimidating bouncer and a flexible bodyguard\u00a0<\/strong><\/h3>\n<p>I\u2019m not talking earpieces, overcompensating muscles and extra small shirts. I\u2019m talking about firewalls, anti-virus, and anti-malware\/spyware on all computers: security at the front entrance and protection wherever you go. If you aren\u2019t sure how things are going in this area, I strongly encourage you to go back to step #1 and revisit that conversation.<\/p>\n<p>You can\u2019t build a secure line of defense if you don\u2019t have current technology that\u2019s properly configured to fit your organizational needs, exploring everything from <a href=\"https:\/\/www.watchguard.com\/wgrd-products\/cloud-and-virtual-firewalls\" target=\"_blank\" rel=\"noopener\">cloud-based firewalls<\/a> to artificial intelligence solutions that alert you when malware has mutated and become active. Once you\u2019ve protected these points, you can begin looking at where your organization is most vulnerable and create a plan for everything in-between. Which brings us to step #3 of our cybersecurity business plan\u2026<\/p>\n<h3><strong>3. Assume the worst-case scenario and work backwards <\/strong><\/h3>\n<p>I\u2019ve heard that up to 60% of small business that experience a data breech will close within six months! Understanding <a href=\"https:\/\/ccbtechnology.com\/4-reasons-why-penetration-testing-is-critical\/\" target=\"_blank\" rel=\"noopener\">where your company is susceptible<\/a> is important, because lack of action can be devastating. So let\u2019s get the juices flowing with a few things that you hope never actually happen in your business:<\/p>\n<ul>\n<li>Accounting receives a realistic-looking email from the CEO asking for $165,000 to be transferred to an account ASAP<\/li>\n<li>A sales rep returns from a business trip with a countdown on his laptop and a demand for $50,000<\/li>\n<li>An employee on lunch, excited about a dream vacation, clicks on an email link for a free cruise to the Bahamas that comes with a side of malware<\/li>\n<\/ul>\n<p>One tool that would help in the last scenario is one our IT department uses at CCB \u2013 a <a href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\" rel=\"noopener\">KnowBe4<\/a> pop-up that makes you re-think before proceeding with a link. Below is a screenshot of what came up when I was pulling up the malware video on YouTube. (I sent this to one of our IT guys in a Teams message with no context to be funny\u2026 I don\u2019t recommend doing that.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-163008 aligncenter\" src=\"https:\/\/ccbtechnology.com\/wp-content\/uploads\/2018\/02\/5-2-Cybersecuritybusinessplan-300x88.png\" alt=\"\" width=\"433\" height=\"127\" srcset=\"https:\/\/ccbtechnology.com\/wp-content\/uploads\/2018\/02\/5-2-Cybersecuritybusinessplan-300x88.png 300w, https:\/\/ccbtechnology.com\/wp-content\/uploads\/2018\/02\/5-2-Cybersecuritybusinessplan.png 554w\" sizes=\"auto, (max-width: 433px) 100vw, 433px\" \/><\/p>\n<p>After fleshing out the scenarios you decide to use, ask these questions<strong>: <\/strong><\/p>\n<p style=\"padding-left: 30px;\"><strong>1.<\/strong> What would need to be true in order to prevent this from happening in our company?<br \/>\n<strong>2.<\/strong> Are we prepared if this were to happen to us? If not, what needs to change?<\/p>\n<p>Sometimes knowing where to go next is a challenge for companies, that\u2019s why CCB developed our <strong>free<\/strong> <strong>Security Health Check<\/strong>. It\u2019s not an assessment of your environment, but it\u2019s a comprehensive first discussion. In just 30 minutes it can reveal areas that need addressing along with possible solutions you may not be utilizing. Contact us to set up <a href=\"https:\/\/ccbtechnology.com\/contact-us\/\" target=\"_blank\" rel=\"noopener\">your free security health check<\/a>.<\/p>\n<h3><strong class=\"aligncenter\">4. Think like a pirate, not a pioneer<\/strong><\/h3>\n<p>Don\u2019t follow the analogy too far and miss my relatively simple point: You don\u2019t need to blaze a new trail for your cybersecurity business plan if you can find what\u2019s working and take it for yourself.<\/p>\n<ul>\n<li>Talk to similarly positioned people in your industry and ask them what cybersecurity strategies have worked or not worked for their IT security.<\/li>\n<li>Attend security-focused events, where you can ask questions, openly discuss concerns, and see solutions in action.<\/li>\n<li>Listen to industry-related podcasts or engage on forums\u00a0to find out what\u2019s working and what to avoid.<\/li>\n<\/ul>\n<p>Finding multiple ways to stay connected to the industry is important because the security landscape is continually changing, and you need to be well informed.<\/p>\n<h3><strong>5. Train, test, then repeat<\/strong><\/h3>\n<p>The Leaky Bucket Principle applies here. Whatever IT trains us on or implements internally will slowly leak out of our head as more information is poured in. It\u2019s not intentional on anyone\u2019s part but it happens, so our IT team tests our employees periodically by sending out phishing emails to see how we respond. Then if needed, they <em>gently<\/em> repeat what they\u2019ve already explained and test us again.<\/p>\n<p><strong>Do your users know:<\/strong><\/p>\n<ul>\n<li>If the wording in an email seems off, to double-check the address from the sender?<\/li>\n<li>To hover over links before clicking?<\/li>\n<li>If they don\u2019t know the sender, it\u2019s best to assume the attachment will ruin their life upon opening?!<\/li>\n<li>Using MiFi for travel will help them avoid hotel and coffee shop Wi-Fi?<\/li>\n<\/ul>\n<p>Be sure that <a href=\"https:\/\/ccbtechnology.com\/end-user-security-awareness-training\/\" target=\"_blank\" rel=\"noopener\">end user security training<\/a> and testing are part of your cybersecurity business plan to secure your environment.<\/p>\n<h3>Want more help learning about security solutions?<\/h3>\n<p style=\"padding-left: 3px;\">CCB has a team of experienced engineers who enjoy working alongside organizations and customizing business security solutions. Whether you\u2019ve got 30 locations or one part-time IT person, we can help. (And don\u2019t forget to <a href=\"https:\/\/ccbtechnology.com\/contact-us\/\" target=\"_blank\" rel=\"noopener\">request your Security Health Check.<\/a>)<\/p>\n<p><strong><a href=\"https:\/\/ccbtechnology.com\/contact-us\/\" target=\"_blank\" rel=\"noopener\">Let\u2019s set up an appointment<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m sure you\u2019re familiar with the phrase \u201cthere\u2019s a first time for everything!\u201d Well, I can think of at least 300 different things I never [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":160964,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-140748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/posts\/140748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/comments?post=140748"}],"version-history":[{"count":0,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/posts\/140748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/media\/160964"}],"wp:attachment":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/media?parent=140748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/categories?post=140748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/tags?post=140748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}