Five recommendations for top executives to prevent security breaches.



The war against cyber-attacks is long-term fight in terms of education, training, methodologies and technologies. When it comes to security breaches, they are inevitable, but we can mitigate the risk if companies understand what pre-emptive measures to take before an incident occurs.
As part of our global commitment, Connectikpeople.co soon RetinkNow®, has captured for you tips from Pluralsight, ( e-learning for technology and creative professionals) susceptible to help organizations with a digital presence, including websites, point-of-sale terminals and software companies, protect their businesses and keep information secure.
According to Pluralsight:

‘’1. Do not rely on security audits alone. While standards such as PCI DSS (the Payment Card Industry Data Security Standards) encourage security compliance to rules and regulations, these standards are infrequently assessed, rarely exhaustive and can easily be compromised by simple oversights in processes. A successful audit often leaves a company feeling “secure,” but it is not a foolproof measure for company security.
2. Let the IT department’s security culture play an important role. Security management is an ongoing process, and an organization’s culture and approach to security can show its propensity for risk in being attacked. The following questions can help ensure IT maintains a culture of security:
  • Do software developers and IT professionals working on building systems undergo any formal security training?
  • Are there dedicated security professionals involved in assessing the IT landscape?
  • Are there regular penetration tests? Is there someone accountable—such as a Chief Information Security Officer—who is shepherding these processes?
3. Make sure security is not simply implied. Following a security breach, many organizations respond that they believed the system was “secure;” however, as the implementation of these systems is entrusted to partners or staff, the definition of “security” is often vaguely defined and can be misinterpreted. Expectations should be explicit and clearly spelled out as part of the system requirements to prevent the exploitation of security risks. Wherever possible, security standards should be defined as a requirement of the system, as should the processes that assess these standards and
ensure compliance.

4. Understand security is a balance, not an absolute state. A common fallacy with security is that a system is either “secure” or “insecure,” but any system will eventually fall to a determined attacker. Organizations must focus on defining the balance between what is being protected, who it is being protected from, and the overall impact a breach will have, and strive not for an ultimate state of “secure,” but rather “secure enough” for their unique circumstances. In addition, vulnerabilities and risks will evolve over time, and security controls need to adapt accordingly. 

5. Communicate early and clearly in the event of an incident. Even when all reasonable measures are taken, security incidents do still occur. When a system is compromised, customers are often left wondering about the impact, leading to speculation that adversely affects a company’s reputation. Communicating with customers early is essential, and failing to do so promptly, clearly and concisely after a breach can be detrimental to a brand. In order to avoid confusion, organizations can develop an incident response plan that addresses who takes responsibility for a breach, how it affects customers and how to minimize the potential damage to the organization’’.

Popular Posts