Skip to content
Service Delivery Community

Cyber‐Attacks: Ignore Them at Your Own Risk

Cyber‐attacks come in all shapes and sizes suited for all types of organization. Ignore them at your own risk.

Any organization with the perception that cyber security is not for them, that they are not and will not be impacted by Cyber‐attacks are in a big denial with the reality.

With Business Globalization and every organization big or small connected to internet to do their business, organizations have to realize they are not operating in isolation. We are all connected to the same internet that is also used by the cyber attackers. Cyber‐attacks are not limited to Banks or Financial institutions. They come in all shapes and sizes suited for any type of organization. Cyber‐attacks happens for information, identity theft, politically driven or to damage the organizations reputation. Any organization that has something that is of interest to others, their competitors, their errant employees, the governments and others, then they are vulnerable to cyber‐attacks. The attackers can target the organizations assets even without stepping a foot inside the organization. They can do it all from the comfort of their homes from anywhere in the world. All they need is an internet connection. And these guys are highly professional, well organized and motivated to execute such attacks. Because it’s low risk and quick gains.

Though no security can guarantee to avoid cyber‐attacks completely, deploying cyber securities can mitigate such attacks. Cyber security plays a very important role in an organization and it should be embedded in every business process and decisions. Organizations must be vigilant, equipped and capable to combat cyber threats.

Most of the cyber‐attacks for data thefts are caused by our own employee negligence. And these insider vulnerability kicks open the doors for the cyber attackers to enter and cause the damage. That does not mean our employees are bad people. Its good people making mistakes and failure of processes in place. A common misconception is that since we have a policy manual and have done the training, people are going to follow it and execute it perfectly, well they don’t.

The advent of BYOD and Cloud services are potential sources of data breaches. Security experts have to be a step ahead with the knowledge of the technology used and its latest weaknesses. You never know what applications and services have a vulnerability that can expose the whole network to the cyber criminals to cause damage. To prevent and mitigate such breaches it’s recommended to conduct:

  • Periodic employee awareness and training on how to handle confidential data.
  • Use technology to identify and classify sensitive data and then put controls in place to protect it from leaving the organization
  • Deploy encryption and authentication solutions
  • Put incident response plan in place to manage data breaches