Learn the best ways to keep your systems and your data safe from ransomware attacks, with advice from Danny Pehar, Bestselling Cybersecurity Author and Technology Council Member at Forbes.

 

Target

Hackers are targeting sensitive information. Understanding how to manage sensitive information is an excellent start to any cybersecurity awareness training. What sensitive information does our organization have access to? Who within the organization has access to what sensitive information? Where do we keep this sensitive information? Knowing this information will help during a cyber breach, when time is most precious.

 

Attack

Talk to your teams about the different types of malware that exist, and how hackers play on their victims’ emotions. Teach your teams that hackers use all forms of contact to obtain info: email, instant messaging, text, social networks, phone, office walk-ins, and even fax. If your team receives a message that evokes a strong emotion, teach them to take a deep breath, count to 10, and reassess before taking action.

 

Vulnerability

Once you understand your hackers target and how they’re attacking, assess the locations and types of info that are likely to be most vulnerable. Vulnerabilities include passwords, email accounts, computers, public Wi-Fi, and offices. Also, teach your team to take special precautions with these vulnerabilities in your company.

 

Impact

Many organizations preach fear to their employees about terrible things that can happen if a breach occurs. Although there is truth to this fear, it’s important to remind your team it can happen to anyone. Even the CIA got hacked when in 2015 former CIA chief John Brennan was targeted. Rather than just spreading fear, encourage appropriate behaviour and raise awareness with stories like what happened to the CIA.

Click here to read the full Forbes article.

Proactively protect your systems with Mid-Range Managed Security Services.

Other Articles

An important message to our customers & suppliers

At Mid-Range, the health of our employees, customers, partners and suppliers is our top priority. As we face the COVID-19 crisis, we would like to…

7 Cybersecurity Tips

For today’s enterprise, the question is not whether you will be attacked. It’s when, by what, and how badly your company’s reputation or finances…

Man working on laptop at office

Job Opp: I.T. Solution and Services Architect

This position works within the team responsible to provide I.T. Managed Services to our x86-based customer systems, in accordance with service…

Employees Working together at office

Job Opp: Account Executive

This position works within the team responsible to provide I.T. Managed Services to our x86-based customer systems, in accordance with service…

Abstract blue nodes depicting big data

The Three “V”s of Big Data

Before you create your first draft of the schema or the architecture you must put into perspective this part of the problem you are being asked to…

Technicians using laptop while analyzing server in server room

Job Opp: Technical Operations Specialist (x86)

This position works within the team responsible to provide I.T. Managed Services to our x86-based customer systems, in accordance with service…

Abstract Blue Image Data Connections and technology

Solution Decision Information Flow for Better Business Decisions

The use of a Solution Decision Information Flow can improve your business decisions. Read this article to see a real-world example of how it can…

Collaborate 2020 event

COLLABORATE 20

At COLLABORATE 20, IT decision makers, super users, system administrators and developers alike find practical solutions to today’s business…

Director of Sales Handshake outside with buildings

Job Opp: Director of Sales

Reporting to the Vice President Sales, the Director of Sales is responsible for direct, monitor and report on Mid-Range sales objectives and…

Technicians using laptop while analyzing server in server room

Job Opp: Technical Specialist (IBM Power, iSeries, VIOS, Storage)

This role will work within the field services team providing expertise to our customers in accordance with company policies, procedures and…

Copyright 2020. Mid-Range. All Rights Reserved    |    Privacy policy    |    Site Map    |    Accessibility Policy