Archive for September, 2014

Chuck Leaver – Don’t Keep Cyber Attacks A Secret

Posted By Chuck Leaver _ Ziften Technologies CEO

 

 

A business suffers a cyber attack. The system administrators discover the attack, they would like to know more about it, they send their IT group to attempt and stem the attack and recoup lost data. This is exactly what occurs after many companies have actually been breached, but then the business typically cannot take the next crucial action: the proactive notifying of their consumers that they have experienced a cyber attack. There have actually been numerous cases where it has been hard to obtain a business to connect to its consumers and it takes a lot more time and browbeating than it ought to do.

There is a tendency now that business that have actually been breached just do not want to inform those that have actually been affected by the attack– their clients– that the attack occurred according to the Portland Press Herald. The factor that businesses do not want to inform their clients is entirely selfish. They are worried that the track record of their business will be damaged if they inform the world about the attack so they constantly want to keep this news in house. Both Target and Neiman Marcus did this and waited far too long to tell their consumers that they had actually been victims of a cyber attack.

 

It Is Just Counterproductive To Keep Cyber Attack News Away From Your Consumers

 

It is entirely irresponsible to keep back on telling your customers about a cyber attack and it can likewise work against you. If there is a long space in between the attack happening and the business admitting that it took place then it can appear that the business is being dishonest and is not proficient enough to safeguard client data. In spite of this, businesses that have actually experienced an attack continue to withhold this information from their clients. JP Morgan Chase was an example where there was a hold-up of around four months before they informed their clients that they had suffered a major cyber attack. U.S. Public Interest Research Group consumer program director, Ed Mierzwinski, said there is a great deal of work to do when it pertains to informing clients that a breach has taken place.

He stated that clearing your name was a “pain in the neck”. He also stated that it takes a great deal of time and the business does not earn money for doing this.

Regardless of the time and effort involved, it is very important that businesses adopt a full healing procedure and that they notify their clients about the cyber attack every step of the way. If the thought of informing your customers that you have been attacked does not appeal then you can prevent attacks from occurring in the first place. If a strict endpoint detection and response system is implemented then a business can safeguard their network and be sure that they will not experience a cyber attack and put their client data at risk.

 

 

 

 

Chuck Leaver

Chuck Leaver – Businesses Face Losses Without Endpoint Detection And Response

Written By: Chuck Leaver Ziften Technologies CEO

 

Businesses must be taking every possible action to safeguard their infrastructure with the current threat of cyber security attacks and it is fascinating that they are refraining from doing this. Their information is essential to them however they are taking no action. Writing for bobsguide, guest poster Torgny Gunnarsson– who manages a company that offer data solutions – made the point that at a time when all businesses are constantly attempting to leverage brand-new technology, they seem to be reluctant to put the protective steps in place, such as endpoint detection and response. While it excellent that businesses are utilizing the latest technology, they are at the exact same time ending up being vulnerable to a new world of dangers that include data loss, breaches of passwords and ransomware.

A few of these companies might not genuinely know the threat of cyber security and virtual crime, after they are hit with this issue there will be a variety of repercussions to this. Gunnarson references attacks on Target and Adobe in his writing and states that these were examples of shortfalls in security which led to big monetary losses. With the Adobe attack there was a loss of 38 million users. Alerting 38 million users about this would certainly come at a high price states Data Breach Insurance, and after that there are the costs of recovery as well as that. Reuters mentioned that Target needed to pay more than $60 million as a result of the information breach, and also experienced a loss of business as a result of the cyber attack.

You would think that these kinds of high profile losses would have all companies rushing out to protect themselves with an endpoint detection and response system and take any other measures that they might to prevent cyber crime. However the truth is different and lots of businesses think that there is no chance that their infrastructure will ever be under attack. This is a very risky strategy and very short sighted in this current environment of cyber attacks.

Secure Your Business Now With These Actions

It is a challenging possibility to believe that there are a variety of cyber lawbreakers who wish to access your data. You do not have to be the next victim of this just because there are a great deal of hackers out there. By taking these actions listed below you will make a significant influence on keeping hackers away from your infrastructure:

1. You need to implement an endpoint detection and response system. Absolutely nothing else is more crucial when it pertains to defending your business from a cyber attack. When you implement enterprise endpoints you will have the comfort that there will be no attempted attacks on your infrastructure without you being aware of it.

2. You have to make certain that all of your employees know the danger of cyber security. Don’t just leave it to your IT team to be up to speed with the latest cyber security dangers. You must understand that a cyber attack can be instigated from absolutely anywhere in the world and these hackers can target any company. When you keep your workers informed about these cyber dangers you add another level of defense by guaranteeing that employees practice safe computing and do everything humanly possible to keep the hackers out.

3. You have to constantly monitor security. It ought to be a leading concern to take care of your cyber security so ensure that it is. Make certain that your endpoint detection software application is up to date and put cyber security on the program at every conference. There is no place for complacency with cyber security.