Cybersecurity Issues Not Typical Support TIckets

By Carol Hagen posted 02-01-2017 15:24

  
If you've ever had malware on a computer, you've probably just called IT and they've cleared it off your PC.  So did you find out how the malware happened to successfully infect your PC? Is it infecting other computers in your network?   Cybersecurity should be handled differently than your typical support ticket.  If you don't learn from each incident, you'll likely have more problems.  

In a recent article in Networld World, How to Practice Cybersecurity, the author Lior Div points out that "Practicing cybersecurity begins with security teams changing their mindset around how they handle threats.  ...need to be encouraged to not quickly close tickets and spend time looking for a full-blown attack in their environment."  It's really risk management 101.

What's surprising is that the volume of spam email increased 300% in 2016.  While just 8% of spam email is malicious, that increase makes you more susceptible. Cisco’s 2017 Annual Cybersecurity Report clearly states that spam is a threat to your network, and has become an important carrier of attacks like spear phishing, ransomware and bots.  With 65% of all corporate email being spam, criminals have migrated to what produces the best results for them, and email spear phishing has become their method of choice.  

No one wants to experience a breach, but there is a silver lining when you get hit.  Breaches help promote improved security yet, old-school security awareness training doesn’t hack it anymore. More than ever, your users are the weak link in your network security.  We have a brand new, patent-pending feature that you'll want to see.

We're hosting a 30-minute webinar of a game-changing Security Awareness Training Platform on Wednesday, February 8, 2017, at 2:00 p.m. (EST).  You'll learn

how easy it is to train and phish your users, and set the system on auto-pilot to keep your team trained to spot and report questionable email content.  Avoid becoming another cybersecurity breach statistic and shore up your weakest link.

Contact me if you're interested and I'll get you registered.



 

0 comments
114 views

Permalink