Let's Talk ERP

Monthly Video Webinar Series with Thought Leaders and Influencers

5 Ways to Protect your Company against Cyber Attacks

1. Business Continuity

Be proactive about threats and risks by coming up with a strategy of what to do if disaster strikes. Having backup data sources is extremely crucial as they are often the last defence against recovery (technical or human-impacted). All data should be backed up multiple times throughout the day and should be non-Windows based to prevent ransomware, breaches and other Microsoft viruses. If the server gets infected, an IT professional will have to restore it which may take two to three days. Ask your IT firm to conduct a security assessment of your network and its vulnerabilities every year. After the assessment, you can figure out how to best manage your risk. Consider getting cyber insurance, as everyone is at risk: whether you are a big or small company.

2. User training

Employees should, at the very least, be given quarterly updates on training, as cybersecurity is always changing. Monthly or weekly updates are highly recommended, but at the very minimum, there should be quarterly training updates in place. In the case of ransomware and data breaches, timeliness is everything. Ransomware is now being used as a distraction to cover up a breach. Those who see a ransom note become concerned with the ransom, not realizing that there is a breach going on as well. User training is key to be able to spot the earliest signs of suspicion.

3. ​​Next Gen Endpoint Protection

This is a protection software that prevents infections by continually learning about malware to detect and block suspicious behaviour, rather than waiting for it to inflict damage. It does not rely on an anti-virus signature to combat malware. It also offers mitigation, remediation and forensics.

4. ​​Data encryption

To encrypt data is to convert data from a readable form to an encoded version which can only be viewed with a decryption key. If your company's data is encrypted and there is a breach, you don't even have to report the breach because no data was lost. However, this is a double-edged sword that must be adequately managed. This will prevent a breach but it will not prevent ransomware from occurring. Even if you encrypt your data, a scammer can re-encrypt it using a different key.

5. SIEM (security info event management)

SIEM collects logs which tracks everything that is going on within the system. Instead of looking at a million log entries, it sends only the notifications that look suspicious. This is becoming more important because firewalls and antivirus work well against known attacks, but we need to consider there may be unknown attacks happening as well. This is a great solution for those companies that are regulatory minded, as it checks all the boxes and helps them to be protected in a more regulatory environment. 

Find us on Social

Don't forget to follow us

Want to be a Speaker?

Have a topic you think will add value to the ‘Let’s Talk ERP’ series?
A topic people would love to hear about?
Would you like the opportunity to present your topic at on a future segment?
We want to hear from you. Give us a call at 416-777-6305 or Email Us