Search
Thursday, December 08, 2022

Alert, companies: do you comply with the cyber security plan?

Telecoms Without Cyber ​​Security Are A Risk With Too High Toll To Pay, New working models indicate cybercrime in progressive development, effective action and a well-organized strategy to keep company information under lock and key.


A survey conducted by the labor consultancy, ‘Steelcase’ and attended by executives from various major companies in the United States, Canada, Mexico, Italy, England or Spain, but whose proper names were not provided, showed that Of the more than 8,000 organizations across different industries, 72% plan to continue with the hybrid work model,


Thus, as the report points out in its findings, companies and employees in this position are the ones who should receive the most training and awareness about cyber security, using passwords, information, access points and data from the business.

Telecom: Five Pivots of Cyber ​​Security Planning

Although each industry and job position has its own specifics, these are: five basic points who should tell everything Cyber ​​security plan for companies with virtual presence, It is based on the ‘Cyber ​​Security Shock Plan’ approved by the government within the framework of a new package of measures against cyber threats.

  1. Identify what you want to preserve, Knowing the sensitivity of the organization is the first step. For example, a retail business may need to focus more on platforms with strong access or identification mechanisms or keep in mind that administrators and employees use unique passwords. In contrast, a logistics company should focus its security efforts on downloading files, emails, and equipment operated by employees.
  2. Updated password and system, Although it seems obvious, it is rare. It is necessary to strengthen passwords and change them frequently and update the device operating system. Also, instruct employees about the latest virtual technologies used by criminals, such as ‘phishing’, in which many people are fooled by links seen in emails, social networks or WhatsApp messages, or ‘ransomware’ , in which the money is requested to be used. Blocked system, whose attack rate rises to six cases per minute, according to INCIBE. Hence it is advised never to share information or work tools.
  3. assign budget, “Employees should be trained in cyber security,” says Yevgeny Kaspersky, executive director of Antivirus, in which his last name bears his name. The most important is the money invested in training and awareness of users having access to remote devices in order to initiate a preventive and safety plan.
  4. take out insurance, Like car or home insurance, in the digital environment, damages are predictable. As such, cyber security policies are designed to rectify or repair certain types of impacts depending on the industry. Although they do not prevent attacks, they do ensure that there should be business continuity. In this case, additional funds will have to be allocated to recover what was lost. Currently, as the consulting firm Deloitte points out, there are various coverage plans without involving large investments.
  5. generate continuous processes, Instead of reacting, we should stop. That workers are aware that keeping data, equipment and information in a safe place is an ongoing process and not punctual. According to Kaspersky, cyber attacks will continue to grow by 24% in 2022.

Nation World News is the fastest emerging news website covering all the latest news, world’s top stories, science news entertainment sports cricket’s latest discoveries, new technology gadgets, politics news, and more.

Latest News

Related Stories