The top 3 cyber security measures companies overlook (and how to fix them!)
Paul Wike
July 18, 2024
Subscribe for relevant industry news, offers, and updates
June 24, 2024
March 01, 2024
February 06, 2024
Unfortunately, compliance does not necessarily equate to security. With all the regulations and cyber security frameworks in place, many companies mistakenly believe they are well-protected. So, what are some of the most commonly overlooked issues?
Hiring a security team alone isn't sufficient without taking the time to train your employees. This is critical yet often overlooked. A one-off, dull annual training session will not be enough to keep your company well-protected. While you might invest heavily in tools and programmes, it only takes one employee clicking on a malicious email link to compromise everything.
Many organisations seek a rubber stamp on their security measures. Too often, leaders and consultants are eager to comply superficially and then don’t know how to handle issues or, worse, vanish when issues arise. Moving away from this mentality and fostering accountability can lead to a positive cultural shift.
Focusing solely on security controls without considering the cost and impact on the risk profile is misguided. Cyber security is fundamentally about risk management. Significant security improvements can be made by managing assets effectively and establishing sound policies, often without the need for expensive tools. It's crucial to communicate risk in terms that resonate with different audiences. For instance, a finance professional requires a different explanation than a restaurant owner.
The security of third-party vendors and supply chains is frequently neglected, despite being a significant entry point for attackers. A staggering 98% of organizations are affiliated with a third party that has experienced a breach. Furthermore, third-party attacks have led to 29% of breaches. As internal systems become more secure, attackers increasingly target the weakest links. Getting management to prioritise vendor vetting can be challenging. While it might seem easy to offload responsibility, the repercussions of a breach through a third party can be severe and complex.
Adhering to regulations like the General Data Protection Regulation (GDPR) is essential in the UK, but leveraging government support is crucial. The National Cyber Security Centre (NCSC) offers valuable resources and guidelines for improving cyber resilience. Incorporating these into your strategy can provide an additional layer of security. Alongside regulatory compliance, implementing basic cyber hygiene practices can significantly enhance your security posture.