Learn the best ways to keep your systems and your data safe from ransomware attacks, with advice from Danny Pehar, Bestselling Cybersecurity Author and Technology Council Member at Forbes.

 

Target

Hackers are targeting sensitive information. Understanding how to manage sensitive information is an excellent start to any cybersecurity awareness training. What sensitive information does our organization have access to? Who within the organization has access to what sensitive information? Where do we keep this sensitive information? Knowing this information will help during a cyber breach, when time is most precious.

 

Attack

Talk to your teams about the different types of malware that exist, and how hackers play on their victims’ emotions. Teach your teams that hackers use all forms of contact to obtain info: email, instant messaging, text, social networks, phone, office walk-ins, and even fax. If your team receives a message that evokes a strong emotion, teach them to take a deep breath, count to 10, and reassess before taking action.

 

Vulnerability

Once you understand your hackers target and how they’re attacking, assess the locations and types of info that are likely to be most vulnerable. Vulnerabilities include passwords, email accounts, computers, public Wi-Fi, and offices. Also, teach your team to take special precautions with these vulnerabilities in your company.

 

Impact

Many organizations preach fear to their employees about terrible things that can happen if a breach occurs. Although there is truth to this fear, it’s important to remind your team it can happen to anyone. Even the CIA got hacked when in 2015 former CIA chief John Brennan was targeted. Rather than just spreading fear, encourage appropriate behaviour and raise awareness with stories like what happened to the CIA.

Click here to read the full Forbes article.

Proactively protect your systems with Mid-Range Managed Security Services.

Other Articles

The Importance Of Cyber Insurance

I’ve been in the cybersecurity industry for pretty much my entire adult life; it’s the only career I’ve ever had. And yet one of my favorite…

Why Cybersecurity Is So Complicated

When you think of problems people had with cell phones back in the 80s, whether you experienced them firsthand or you’ve seen clips from movies, you…

Top Takeaways from ESG’s White Paper on Multicloud Storage Environments - Person using a tablet

Top Takeaways from ESG’s White Paper on Multicloud Storage Environments

Research shows that when an organization has taken the necessary steps to reach Storage Maturity, they have a competitive advantage due to their…

Home Cyber Hygiene Checklist

Our homes are becoming smarter and, as cool as that is, what’s even cooler are people who are as smart as their smart homes.

A New Opportunity for Cyber Attacks

There's a cybersecurity threat so troublesome that not even some of the best cybersecurity technology can stop it. It's called psychology, and it's…

An important message to our customers & suppliers

At Mid-Range, the health of our employees, customers, partners and suppliers is our top priority. As we face the COVID-19 crisis, we would like to…

7 Cybersecurity Tips

For today’s enterprise, the question is not whether you will be attacked. It’s when, by what, and how badly your company’s reputation or finances…

Employees Working together at office

Job Opp: Account Executive

This position works within the team responsible to provide I.T. Managed Services to our x86-based customer systems, in accordance with service…

Abstract blue nodes depicting big data

The Three “V”s of Big Data

Before you create your first draft of the schema or the architecture you must put into perspective this part of the problem you are being asked to…

Copyright 2020. Mid-Range. All Rights Reserved    |    Privacy policy    |    Site Map    |    Accessibility Policy