3 Critical Cybersecurity Steps Your Company Must Take

I have presented at several cybersecurity conferences over the last few weeks and have had an opportunity to listen to and talk with some of the most highly regarded experts in this field. This includes experts from the FBI, Secret Service, private industry experts and many others.

The message I have heard over and over from all of these people echo these three things that every company must be doing to protect itself right now. To me, this means they qualify as “critical” for companies to be more secure. Obviously, there’s a lot more that companies should do and I’m sure many people have their own thoughts as to what these three may be, but these are the three I have heard over and over:

  1. Train all employees to recognize and resist falling for phishing emails.
  2. Use multi factor authentication.
  3. Use adequate logging to detect intrusions and unauthorized activity in your network and maintain the logs for an adequate period of time. Statistics show the average time before an intrusion is discovered is 205 days. The logs will be cruicial in any investigation so you need to retain them for at least that long.

UPDATE: After I posted this article on LinkedIn, my friend Jim McConnell who knows more about third-party risk and supply chain risk management than probably anybody else I know, posted the following suggestions for this post. As usual, Jim is spot-on and would like to share Jim’s insights with you:

jim-comment

The post is HERE and I would encourage you to join in the discussion — after all, we are all learning from each other as we go along and conversations like this are a great way to do it!

______________________

Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Partner at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.

 

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s