Learn the best ways to keep your systems and your data safe from ransomware attacks, with advice from Danny Pehar, Bestselling Cybersecurity Author and Technology Council Member at Forbes.

 

Target

Hackers are targeting sensitive information. Understanding how to manage sensitive information is an excellent start to any cybersecurity awareness training. What sensitive information does our organization have access to? Who within the organization has access to what sensitive information? Where do we keep this sensitive information? Knowing this information will help during a cyber breach, when time is most precious.

 

Attack

Talk to your teams about the different types of malware that exist, and how hackers play on their victims’ emotions. Teach your teams that hackers use all forms of contact to obtain info: email, instant messaging, text, social networks, phone, office walk-ins, and even fax. If your team receives a message that evokes a strong emotion, teach them to take a deep breath, count to 10, and reassess before taking action.

 

Vulnerability

Once you understand your hackers target and how they’re attacking, assess the locations and types of info that are likely to be most vulnerable. Vulnerabilities include passwords, email accounts, computers, public Wi-Fi, and offices. Also, teach your team to take special precautions with these vulnerabilities in your company.

 

Impact

Many organizations preach fear to their employees about terrible things that can happen if a breach occurs. Although there is truth to this fear, it’s important to remind your team it can happen to anyone. Even the CIA got hacked when in 2015 former CIA chief John Brennan was targeted. Rather than just spreading fear, encourage appropriate behaviour and raise awareness with stories like what happened to the CIA.

Click here to read the full Forbes article.

Proactively protect your systems with Mid-Range Managed Security Services.

Other Articles

, Maintaining Data Center Hygiene: Our Comprehensive Approach at Mid-Range

Maintaining Data Center Hygiene: Our Comprehensive Approach at Mid-Range

In the fast-paced and interconnected digital landscape, data centers have become the nerve centers that power our modern world. These facilities…

, Debunking the Top 5 Myths about Migrating to the Cloud: Insights for IT Decision Makers

Debunking the Top 5 Myths about Migrating to the Cloud: Insights for IT Decision Makers

Debunking common myths about cloud migration to unlock its potential. Simplified processes, robust security, cost savings, and performance…

Immutable Backup, Why Your Business Needs Immutable Backups Today

Why Your Business Needs Immutable Backups Today

Immutable backups are an essential tool for any organization that wants to ensure the integrity and recoverability of its critical data. IBM…

Job, Job Opp: Technical Specialist (IBM i)

Job Opp: Technical Specialist (IBM i)

Deliver technical support and services to Mid-Range Managed Services customer systems in accordance with their contracted agreement.  This position…

Message from the Mid-Range Team

Holiday message to our customers and partners for this holiday season.

Account Executive, Job Opp: Software Sales Executive

Job Opp: Software Sales Executive

This Account Executive will have a territory of current named JD Edwards customers in Eastern Canada and select USA-based customers as the leads are…

Information Flow, Message from the Mid-Range Team

Message from the Mid-Range Team

Holiday message to our customers and partners for this holiday season.

Information Flow, [Part 3] IBM Power in the Cloud: Considerations and Practical Realities

[Part 3] IBM Power in the Cloud: Considerations and Practical Realities

When evaluating the move from on-premise to the cloud, IBM Power customers across various industries typically ask the same two questions. What stays…

Copyright 2023. Mid-Range. All Rights Reserved    |    Privacy Policy  |  Anti-Spam Commitment    |   Accessibility Policy