Low key cyber protections that have big results

By Business Review Australia Staff

As more and more Australian firms are realizing, cyber criminal activity is going up and there’s no respite in sight. Either a company protects itself proactively, or it becomes a victim. There is no avoidance, just a matter of timing when a company will get hit.

Right now the most critical attacks are coming from organized groups, as opposed to intrepid individual hackers. These groups use a variety of methods for penetration, from digital to in-person theft of information which, when combined with other activities, opens up a treasure trove of vulnerable data to steal and resell.

Physical Defenses

For physical intrusion companies have two options after locking down the physical doors to the office: either hire active security guards who check anyone coming in, or install a card-pass security system where only known employees and partners have a security card to open access to an office. Many firms are implementing both choices simultaneously. The harder a physical penetration of an office is, the more likely a hacker or cyber team is to pick an easier target instead.

Proactive Training

There are plenty of choices for firewalls, anti-virus and hardware routers. However, the majority of data breaches occur because of people being sloppy with their access rights, passwords and company materials in their possession. Organisations that invest in proactive training of staff and partners see a big drop in weak points when people are constantly reminded that they are responsible for keeping a company protected. So behavior and IT sensitivity training should never be overlooked as an effective tool against cyber attacks.

Hire a Breach Tester

While there are plenty of software tools advertised as the best cyber defense in a box, real time identification of weaknesses allows a company to focus efforts where hacks are most likely. A number of good tester consultants are available for all businesses sizes, and can make active efforts to penetrate a company and show where it's not protected. This information can be far more invaluable for remedies and focused efforts than a general prevention software program alone.

Use Monitoring Network Alarms Heavily

Most digital hacks and breaches identify themselves by unusual usage or sudden spikes in data transfer, especially among "authorized users." Advanced networks are bolstering their monitoring side via active alarms and response cutoffs when such activities occur. This approach combines a pairing of digital monitoring with human decision-making, allowing faster shutdown of vulnerable assets and smarter defenses when a hacker changes methods midstream.

Share

Featured Articles

Twitter timeline – how Musk pulled off a hostile takeover

Elon Musk strikes deal to buy Twitter for US$44bn following four months of cryptic tweets, secret meetings and buying of shares – here’s the timeline

Top 10 Asia restaurants, from Tokyo’s Den to Bangkok’s Sorn

From Tokyo to Bangkok, with cuisines spanning Cantonese, Thai and German, we highlight Asia’s top 10 places to eat, as per Asia’s 50 Best Restaurants

Microsoft: what Asia leaders need to know about hybrid work

Microsoft’s 2022 Work Trend Index guides Asia leaders to navigating a hybrid future – from making the office worth the commute to rebuilding social capital

Meet the company: EV Nio to list in Hong Kong, enter Europe

Leadership & Strategy

12 Tech trends to watch closely in 2022, from CB Insights

Technology

Why Deloitte Australia’s HR technology is winning awards

Human Capital