• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

How to Educate Stakeholders on the Realities of Cybersecurity

Dan Matthews / 4 min read.
November 17, 2017
Datafloq AI Score
×

Datafloq AI Score: 73.67

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/g9FTa

Cybersecurity is like the door ajar warning light on the console of a huge van going 80 mph down the freeway. Whoever’s driving the vehicle needs to pull over and close the door, but it’s in the back, it’s only slightly ajar, and at any rate, the van can keep going, so the driver figures they might as well just get to it later. But by the time they get to it, someone has already snuck in and made off with a crate of valuables to sell on the black market.

A new cybersecurity survey of businesses reveals 87 percent of respondents are confident in their cybersecurity preparedness. This comes at a time when 71 percent had at least one breach in the previous year. Types of breaches respondents reported included DoS attacks, fraud, insider attacks, and ransomware. The average cost of a single breach for SMBs was nearly $78K, for enterprises it was nearly $1 million.

Clearly, the door is ajar and many businesses (400 in the survey) naively think they know how to close it.

Businesses aren’t the only ones facing this problem. Schools face cyber attacks too. About 27 percent of schools allow anyone access to their open networks, and 54 percent don’t require antivirus software. In 2015, public schools in Miami were hit with a DoS attack that capsized a standardised test, and in 2016 hackers fooled a Canadian university into revealing bank info, which led to a loss of $11.8 million.

Governments play a complex role here. Some are victims of cyber attacks. Some are responsible for cyber attacks. Ukraine claimed Russia was behind a crippling attack in late June of 2017, and investigators produced evidence that Russia hacked the US presidential election of 2016, breaching voting systems in 39 states.

Governments may also stay quiet about vulnerabilities they’re aware of for strategic purposes, as was the case with the WannaCry attack. That attack was due to a leaked NSA hacking tool the agency had designed to exploit a software vulnerability. Microsoft President Brad Smith criticised the NSA for keeping the vulnerability a secret. The NSA wanted to keep it a secret for their purposes but had they revealed it; businesses could have avoided losing anywhere from hundreds of millions of dollars to $4 billion, depending on who you ask about the extent of the losses. The NSA should have educated businesses regarding the software vulnerability.

Educating stakeholders in schools, businesses, and government organisations is one of the best ways to decrease cyber vulnerability. In schools, stakeholders include teachers, administrative staff, students and parents ‘anyone who accesses school networks. Likewise, at businesses and government organisations, the list of stakeholders encompasses a broad swath that includes all who use the internet while at work, or at home on the device they use for work.

According to Ryan Brack of the Global Cybersecurity Summit, The biggest bang for the buck that companies can make right now is communicating to their users, and that’s both their external users ‘or who they’re providing a service or product to ‘and their internal users. And the reason for this is that large majority of attacks come from user error ‘clicking on a nefarious link or opening an attachment that they shouldn’t.

For businesses and government organisations, it helps for employees and administration to know the following:

  • Never give information to someone whose identity you’re unsure of: Many fraudsters simply lie about their identity and ask for information

  • Secure passwords: Don’t use the same password for multiple accounts, don’t write down Wi-Fi password where someone can see it, create passwords with abstract, impersonal words and/or combinations of random letters, symbols and numbers


    Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

    Consent

  • Don’t store important docs on a hard drive: A company server or the cloud is more secure

  • Don’t click on links, ads, or email attachments that could cause damage: Phishing scams, malware, and ransomware all rely on ill-advised clicks

  • Don’t use work email for personal matters

  • Don’t install suspicious software or programs

  • Keep antivirus software up-to-date and install OS update: Updates provide security patches

For both schools and businesses, one of the biggest issues is BYOD, in which a stakeholder’s device can compromise the network. It helps for schools to do the following:

  • Make sure BYOD policy is airtight: Make sure stakeholders must comply with security standards (such as maintaining antivirus software) to be able to bring their own device; establish a secure administrative network and keep sensitive data on it, and set up a guest network for all other uses

  • Use remote filtering tech: If you issue a device to students or employees and they take it off campus, they can get viruses when they use public Wi-Fi; remote filtering makes them go through a security gateway to access the internet with the device

  • Send files securely: Use security measures such as two-factor authentication when sending sensitive files via email

It’s important for IT and cybersecurity personnel to keep researching and implementing security measures. With continued vigilance, education, updates, and enforcement, your organisation can be safe from cyber attacks. Everyone must know what’s at stake. Awareness will help keep your network safe.

Categories: Cybersecurity
Tags: best practices, corporate training, data breach, Data security, hacking

About Dan Matthews

Dan Matthews is a writer and content consultant from Boise, ID with a passion for tech, innovation, and thinking differently about the world. You can find him on Twitter and LinkedIn.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

Cybersecurity World Asia

March 29, 2023 By r.chan

Top 6 Cybersecurity Certification Programs in 2023

March 22, 2023 By Lucia Adams

How data and modern machine learning can help TSA keep us safe

March 20, 2023 By fahmidkabir737

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Cybersecurity World Asia
  • Cloud Transformation
  • Professional Selling: 3 Steps to High-Performance
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 12 Data Quality Metrics That ACTUALLY Matter
  • How to Build Microservices with Node.js
  • How to Validate OpenAI GPT Model Performance with Text Summarization (Part 1)
  • What is Enterprise Application Integration (EAI), and How Should Your Company Approach It?
  • 5 Best Data Engineering Projects & Ideas for Beginners

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!