Unemployable Graduate
Advertisement
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
No Result
View All Result
Home Workforce

It’s National Cybersecurity Month. Here Are 7 Ways to Keep Your Company Cyber-Safe

October 9, 2022
in Workforce
0
It’s National Cybersecurity Month. Here Are 7 Ways to Keep Your Company Cyber-Safe
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


The truth of cyber resilience is that each of us has a part to play. Here are seven ways to keep your company cyber-safe this National Cybersecurity Month.

Massive data breaches. Crippling ransomware attacks. Diversions of sensitive information to malicious hackers. Faced with these headline stories, many of us feel powerless to stop cyber attacks. We’re inclined to defer that responsibility to cybersecurity professionals whose job it is to monitor and respond to cyber threats and incidents. Yet, the truth of cyber resilience is that each of us has a part to play.

Since 2004, October has been designated Cybersecurity Awareness Month – a time for government, corporations, and nonprofits to help raise cybersecurity awareness across the country and around the world. Here are seven ways to keep your company cyber-safe this National Cybersecurity Month.

#1: Educate Your Workforce About Cyber Resilience and National Cybersecurity Awareness Month Activities

This year’s campaign theme is “See Yourself in Cyber.” It’s meant to demonstrate that, while cybersecurity can seem daunting or complex, it really comes down to individuals. Everyone is encouraged to make smart online decisions – whether at home, at work, at school, or in the community – today and every day.

Unlike previous years, which had weekly themes, the 2022 campaign features four key behaviors to combat cyber attacks (#2 – #5, below). This month, encourage all employees to practice these cyber-smart behaviors. Remind your employees, contractors, managers, and leadership team about their role in keeping your company cyber-secure.

To point them in the right direction, send an email promoting National Cybersecurity Awareness Month activities, tips, and resources. Include relevant articles in your company newsletter. Share cybersecurity tip sheets. Promote your basic cybersecurity learning opportunities for your full employee lifecycle.

Some companies are planning events to engage employees. Cyber-related “fairs” with a mix of education and fun cyber-themed events may work at your company. Try online games with prizes for individuals and teams who get the most correct answers or fastest response times. Or participate in any of the National Cybersecurity Alliance (NCA) online events for the public, including an expert presentation, a #CyberChat Twitter Chat event, and an Afterglow Party.

#2: Think Before You Click: Recognize and Report Phishing

In a phishing attack, the perpetrator sends a message – a text or email – designed to lure someone to disclose login credentials. The perpetrator pretends to be a trusted organization or known contact and urges action – usually clicking on a link. When unsuspecting victims submit their login information, the cyber attackers collect the information and use it to gain access to real websites and systems. A phishing attack can cause extensive financial harm to individuals and companies.

These days, phishing attacks are quite sophisticated and can be difficult to detect. If an email, text message, or link looks or seems a little off, don’t click. It could be an attempt to get sensitive information or install malware.

In your emails and newsletters, let employees and contractors know what to do – and who to contact – if they receive a questionable message.

#3: Update Your Software

This is the second key behavior urged by organizers – and an important one for employers, whether their employees are using company-supplied laptops and phones or their own devices.

Throughout the month – and all year long – remind employees to act quickly if they see a software update notification. Often, updates contain changes that address security vulnerabilities, so the sooner people start using the newest version, the more secure their (and your) systems will be.

It’s easiest – and safest – to turn on automatic updates. Check with your leadership and IT teams to see whether you can require automatic updates at your company.

#4: Use Strong Passwords

So many of today’s websites require user accounts to access the content or services they offer, insisting that users create a password. The problem? As PC Magazine points out, “Some people get the bright idea of using the simplest possible password, like ‘123456789’ or ‘password.’ Others memorize one superbly random password and use it for everything. Either strategy is likely to make you the latest victim of identity theft.”

A “strong” password is one that is long, unique, and randomly generated. Using strong passwords has become easier in recent years, with the emergence of random password generators and password managers. A password manager will generate and remember different, complex passwords for each individual account, encrypting them and keeping them more secure.

Some small companies will subscribe to a password manager for their employees’ work-related passwords. Others will encourage or require employees to use one for all their passwords.

#5: Enable Multi-Factor Authentication

Enabling multi-factor authentication, or MFA, is one of the most effective steps your employees can take to reduce the chances of getting hacked. It’s also the one they’re most likely to resist.

MFA, also known as “two factor authentication” or “two step authentication” is a layered approach to securing data and applications where the system requires users to present two or more credentials before logging in. A password plus the answer to a security question. Or a fingerprint with a one-time security key.

Many employees resist setting up MFA because of the “hassle factor” or having to remember or look up the second credential. Try sharing this 90-second video from the Cybersecurity and Infrastructure Security Agency (CISA), which emphasizes that “implementing MFA can make you 99% less likely to get hacked” and shows how easy it is to turn on MFA.

#6: Build and Strengthen Your Cyber Workforce

Another “angle” of the “See Yourself in Cyber” theme speaks to cyber professionals and those aspiring to join the cyber workforce. CISA and the NCA are talking to business and community leaders across the country about how to build a bigger, more diverse cybersecurity workforce.

To recruit a diverse cybersecurity workforce, be sure you’re hiring for skills. Take a competency-based approach to performance management, to ensure your cyber workforce is building the skills they need and getting the opportunities and promotions they deserve.

October may be a good month for you to “check in” with your cybersecurity personnel. Conduct skills assessments to see if they are keeping their skills current. Check to see if their certifications, too, are up to date. Also remember to see if they’re getting what they need from your organization. Do they have the tools, the support, the opportunities they’re looking for? This “check in” may be one way to ensure that these employees are engaged (not Quiet Quitting) – and motivated to keep your company secure.

#7 Update Your Business Continuity Plans for Cyber Resilience

If you haven’t already, update your business continuity plan to incorporate cyber threats and attacks. Review plans and protocols with your team, including assigning responsibility to track industry developments and incorporate best practices.

As one example, following several high-profile ransomware attacks, CISA and the Multi-State Information Sharing and Analysis Center developed a Ransomware Guide with a detailed checklist for what to do when a ransomware attack occurs. It’s a tricky situation. The FBI and other law enforcement strongly urge against paying ransom to cyber attackers, who may be energized by the result and motivated to do more harm. However, a ransom payment may be less expensive than the cost and personnel required to restore or rebuild systems. Encourage your business continuity team to work through tabletop exercises and healthy debates to come up with a plan and protocols – before an attack forces difficult decision-making under duress.

 

We live in an increasingly digitally connected world where cyber attacks are becoming more widespread and sophisticated every day. Companies, regardless of size or industry, must take proactive measures to combat the growing threat. And the most effective actions require every employee to do their part.

Is your team focused on building a cyber-resilient organization? Download our Competency Management Toolkit to see how a competency-based approach can help. Or contact us to find out how Avilar’s WebMentor Skills™ competency management system can support your efforts.

 

RELATED RESOURCES
Cybersecurity Awareness Month | National Cybersecurity Alliance
Hiring for Skills: It’s the First Good Step for Great Changes | Avilar
How Competencies Can Strengthen Your Business Continuity and Disaster Recovery Plans | Avilar
Multi-Factor Authentication | Cybersecurity and Infrastructure Security Agency (CISA)
Multi-Factor Authentication [Video] | CISA
Ransomware Guide – September 2020 | CISA and the Multi-State Information Sharing and Analysis Center
Resources and Guides | National Cybersecurity Alliance





Source link

Related articles

Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024
What Is Total Compensation?

What Is Total Compensation?

April 10, 2024
Share76Tweet47

Related Posts

Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024
0

In today’s competitive job market, attracting and retaining top talent is more challenging than ever. One of the most powerful...

What Is Total Compensation?

What Is Total Compensation?

April 10, 2024
0

Total compensation represents the complete value of all rewards and benefits an employee receives from their employer in exchange for...

Tackle the 3 A’s – Absence, Agent Burnout, and Attrition

Tackle the 3 A’s – Absence, Agent Burnout, and Attrition

April 10, 2024
0

The role of the contact centre agent is challenging and can lead to burnout. This results in high...

WorkForce Software Announces Thirteenth Annual VISION Conference as Investments in Global Workforce Management Technology Increase for Employers in 2024

WorkForce Software Announces Thirteenth Annual VISION Conference as Investments in Global Workforce Management Technology Increase for Employers in 2024

April 9, 2024
0

LIVONIA, MI – APRIL 3, 2024 – WorkForce Software, the #1 rated workforce management solution for large employers, is excited...

South Dakota begins third round of Freedom Works Here ads with “Building in America” – Drgnews

South Dakota begins third round of Freedom Works Here ads with “Building in America” – Drgnews

April 9, 2024
0

South Dakota begins third round of Freedom Works Here ads with “Building in America”  Drgnews Source link

Load More
  • Trending
  • Comments
  • Latest
Hilarious video explains principles of economics

Hilarious video explains principles of economics

August 21, 2022
HVAC Maintenance Checklist Templates: Download & Print for Free!

HVAC Maintenance Checklist Templates: Download & Print for Free!

May 18, 2023
Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

April 10, 2024
Policy & Politics Journal Blog

Policy & Politics Journal Blog

August 14, 2022
Policy & Politics Journal Blog

Policy & Politics Journal Blog

0
Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

0
Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

0
Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

0
Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

April 11, 2024
Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024

Recent News

Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024

Categories

  • Economics
  • Education
  • Public Policy
  • Videos
  • Workforce

Newsletter

© 2022 All right reserved by unemployablegraduate.com

No Result
View All Result
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us

© 2022 All right reserved by unemployablegraduate.com

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT