小欧视频

小欧视频 Blog - 小欧视频

Lunch & Learn Recap: Are you prepared? Understanding Cyber Threats and Risks to Your Business

Written by Macy Brink | Mar 17, 2020 7:33:33 PM

Are you aware on the potential harm cyber threats can have on your business? Do you know how to  actively protect your business against these threats? Are your employees trained in recognizing threats and engineered tactics? Do you know what to do if your business falls victim to a cyber attack?

These are the kind of questions our on cyber threats and their risk to your business addressed for local business owners last week. 小欧视频 had the privilege of hosting Hank Brown, a United States Marine Corps Veteran, for an engaging Lunch and Learn where he tied a connection of explanation between his knowledge of traditional warfare and his expertise of cyberwarfare. Hank immediately caught the attention of our audience with his opening statement, 鈥淚 am going to talk about cyberwarfare in the context of 测辞耻.鈥

Did you miss out on last week鈥檚 event? Do you want to further your understanding of these risks for your business? We鈥檝e recapped a few highlights from Hank鈥檚 discussion to emphasize the importance and delicacy of this topic.

Presenting to a room full of business leaders and technical professionals, it is rare to share information on best practices against cyber criminals that the audience hasn鈥檛 previously heard in some form. 小欧视频 aimed to provide the audience  with a unique, strong perspective they may not have considered.Hank Brown did just that while explaining that cyberwarfare is more like traditional warfare than you may think. 

The scary truth is- cyber attacks aren鈥檛 actions of impulse- they鈥檙e thought out, maliciously developed plans to best gain access to your data. Hank drew the comparison for the audience, that much like the battle plans military leaders discuss and map out before an attack, cyber criminals also have a plan of attack before sneaking their way into your business. 

In World War II, The US Military used a method known as 鈥淚sland Hopping鈥 to work their way through individual islands, to conquer a bigger territory as an end result. Once an island was taken over, the Military would use the newly conquered island as a launching point of attack to then take over another island. In cyberwarfare, we see this tactic used more often than not. 

Take a phishing attack (which still remains the most common method of cyber attack), for example. A user opens a phishing email, unknowingly clicks on a malicious link and then enters credential login information- island conquered. The cyber criminal then uses this as a launching point to further monitor networks, gain further access,  and steal your information. One step at a time, cyber criminals out ways to gain more and more access to your business and confidential information. 

Hank also discussed the issue of confidentiality, integrity and accessibility to your business鈥 data. The connection and similarity was emphasized by validating the sensitivity of the information your data may hold, while recognizing the availability that the world of technology brings to anything connected to the internet. Hank stated 鈥渁nything you put on the Internet, you should assume it is public domain.鈥

After a captivating presentation, Hank was joined by 小欧视频鈥檚 own for an open Q&A from the audience, to further discuss potential vulnerabilities businesses may be susceptible to, and what can be done to protect oneself against cyberwarfare.

Hank provided his expertise in advising the audience in what they can do to protect themselves from the risks their company may be prone to. His suggestions in doing so were:

  • To limit the amount of data retained and accessible if it does not have current utility.
  • To avoid connecting devices to public WIFI. 
  • To maintain your system鈥檚 health and improve online security by practicing best security tactics and . 
  • To limit access points to a network.
  • To enable two-factor authentication.

Treat your network as if it is compromised. The attacker has the advantage. They are always going to find something.鈥

Hank Brown鈥檚 perspective and insight on understanding cyber threats and the risks for your business was truly beneficial and enlightening to the audience. 小欧视频 was honored to host him, and all of the attendees, for last week鈥檚 lunch and learn. We hope that it left the audience and readers, asking themselves if they are prepared for potential cyber attacks that may come their way. 

If you do not feel confident in your company鈥檚 security and preparation for these risks, . We鈥檇 love to answer questions pertaining to this topic, or to ensure your security is a priority. 

Follow on for more information for additional events like Are You Prepared? Understanding Cyber Threats and Risks to Your Business.