Cybersecurity Hygiene: 8 Steps Your Business Should be Taking - 2 minutes read
Cybersecurity Hygiene: 8 Steps Your Business Should be Taking
Whether you’re managing your enterprise’s cybersecurity or you’ve outsourced it to a service provider, you’re ultimately the one that will be held accountable for a data breach. If your vendor loses your data, your customers and board of directors will likely still hold you responsible.
McAfee’s recent report, Grand Theft Data II: The Drivers and Shifting State of Data Breaches, reveals a majority of IT professionals have experienced at least one data breach, and on average have dealt with six breaches over the course of their career. Nearly three-quarters of all breaches have required public disclosure or have affected financial results.
Enterprise threats are increasing in number and sophistication, while rapidly targeting new vulnerabilities. And while, the top three vectors for exfiltrating data were database leaks, cloud applications, and removable USB drives, IT professionals are most worried about leaks from cloud enterprise applications such as Microsoft OneDrive, Cisco WebEx, and Salesforce.com.
Cybersecurity hygiene best practices must not only be established but updated and followed to keep up with these agile, versatile threats. Here are eight steps your business should be taking to implement better cybersecurity hygiene:
For more on how to improve your enterprise’s cybersecurity hygiene using automation, integration, and cloud-based deployment and analytics, check out McAfee MVISION EDR.
Source: Mcafee.com
Powered by NewsAPI.org
Keywords:
Computer security • Business • Computer security • Outsourcing • Internet service provider • Accountability • Data breach • Board of directors • Intel Security • Data breach • Business • Vulnerability (computing) • Vector graphics • Data • Database • Cloud computing • Removable media • USB flash drive • Information technology • News leak • Enterprise software • OneDrive • WebEx • Salesforce.com • Computer security • Computer security • Business • Computer security • Automation • System integration • Cloud computing • Software deployment • Analytics • Intel Security •
Whether you’re managing your enterprise’s cybersecurity or you’ve outsourced it to a service provider, you’re ultimately the one that will be held accountable for a data breach. If your vendor loses your data, your customers and board of directors will likely still hold you responsible.
McAfee’s recent report, Grand Theft Data II: The Drivers and Shifting State of Data Breaches, reveals a majority of IT professionals have experienced at least one data breach, and on average have dealt with six breaches over the course of their career. Nearly three-quarters of all breaches have required public disclosure or have affected financial results.
Enterprise threats are increasing in number and sophistication, while rapidly targeting new vulnerabilities. And while, the top three vectors for exfiltrating data were database leaks, cloud applications, and removable USB drives, IT professionals are most worried about leaks from cloud enterprise applications such as Microsoft OneDrive, Cisco WebEx, and Salesforce.com.
Cybersecurity hygiene best practices must not only be established but updated and followed to keep up with these agile, versatile threats. Here are eight steps your business should be taking to implement better cybersecurity hygiene:
For more on how to improve your enterprise’s cybersecurity hygiene using automation, integration, and cloud-based deployment and analytics, check out McAfee MVISION EDR.
Source: Mcafee.com
Powered by NewsAPI.org
Keywords:
Computer security • Business • Computer security • Outsourcing • Internet service provider • Accountability • Data breach • Board of directors • Intel Security • Data breach • Business • Vulnerability (computing) • Vector graphics • Data • Database • Cloud computing • Removable media • USB flash drive • Information technology • News leak • Enterprise software • OneDrive • WebEx • Salesforce.com • Computer security • Computer security • Business • Computer security • Automation • System integration • Cloud computing • Software deployment • Analytics • Intel Security •