• Home
  • About Us
    • Our Team
    • Our Mission
    • Testimonials
    • Service Areas
  • Services
    • Tax Services
    • Audit & Assurance
    • Accounting
    • Litigation Support
    • Valuation Advisory
    • Forensic Accounting
    • Business Consulting
  • Resources
    • Client Center
    • Online Tools
    • Important Sites
    • Timely Opportunities
  • MBA News
  • Careers
    • Senior Tax Accountant
    • Tax Manager
    • Bookkeeper / Accountant
  • Contact Us
  • Facebook
  • Google+
  • Linkedin
  • Savvy
  • Twitter
  • Home
  • About Us
    • Our Team
    • Our Mission
    • Testimonials
    • Service Areas
  • Services
    • Tax Services
    • Audit & Assurance
    • Accounting
    • Litigation Support
    • Valuation Advisory
    • Forensic Accounting
    • Business Consulting
  • Resources
    • Client Center
    • Online Tools
    • Important Sites
    • Timely Opportunities
  • MBA News
  • Careers
    • Senior Tax Accountant
    • Tax Manager
    • Bookkeeper / Accountant
  • Contact Us

Blog Post

Strengthen the Weak Links in Your Cybersecurity Plan

30 Mar 2016
Comment are off
MBA Site Administrator
Cybersecurity in St Petersburg Florida

Cybercriminals never seem to give up, and for good reason: Their chances of success make it worthwhile. A recent poll entitled “IT Threats and Data Breaches” found that 94% of companies reported experiencing some form of “external threat.”

After spam, the most commonly reported cyberthreats were viruses, worms, spyware, phishing attacks and network intrusion. Although less common, corporate espionage was also reported by nearly one-fifth of survey respondents.

As a result, a new industry — employee cybersecurity training — has sprouted up. While it’s true that there will always be employees who will click on anything, it’s still critical for employers to try to educate them. Here’s a rundown of how to proceed.

Employee Cybersecurity Checklist

It’s important to test your staff regarding their knowledge of cybercrime, the possibility of breaches, and the role employees play in keeping the company and themselves safe. Your employees need to know that:

  • They should never run or install software on a work computer when a website they are visiting invites them to do so.
  • Malicious emails may appear to be from a coworker or supervisor, urging or instructing them to take an action that is actually dangerous.
  • It’s not okay to use the same passwords on multiple websites.
  • Malware often originates from legitimate websites they regularly visit.

Cybersecurity experts maintain that educating staff members about online security procedures isn’t a “one and done” matter. Employees may be vigilant and avoid the trap in a “spear phishing” (that is, highly customized) attack for a while after being warned, but eventually they let down their guard. Some cybersecurity training services can regularly send your employees phony attacks to test their resistance, enabling you to give remedial instruction to employees who flunk.

The underlying strategy used by many cybercriminals is “social engineering.” In this case, that’s defined as the art of manipulating employees so they give up confidential information. Its effectiveness rests on the fact that it’s easier to find people who are too trusting than it is to hack into a system by purely technical means.

Common Tactics

Frequently used social engineering tactics include:

  • Impersonating a friend, coworker or supervisor,
  • Asking for help,
  • Informing you there’s a problem with your account that requires verification of personal information, and
  • Telling you that you’ve won something, but to receive the prize you must provide your bank information.

While some of these tactics might be transparent to you, it isn’t safe to assume that they will be that clear to all of your employees, including senior managers. In fact, higher level employees may be subject to more attacks because it’s assumed they have greater access to the information hackers are seeking.

Training employees in cybersecurity involves more than just feeding them defensive tactics; it also requires getting them to understand why it all matters. They need to know what is at stake and how a serious cyberattack could affect not only the organization, but also each individual employee. After all, the personal information of everyone on your payroll is in your database, including their Social Security numbers, birthdates, addresses and more.

Detecting a Breach

It’s not always obvious to employees when they have enabled a cyberattack, and thus they need to be trained to spot a breach if one occurs.

It’s also advisable to inform staff members what they need to do if they suspect there’s been a breach. For example, you might instruct them to unplug the computer from the network immediately and then contact the IT department. Even if the breach turns out to be a false alarm, commend the employee for acting quickly to address a perceived problem.

A Real Attack

Policies and procedures for dealing with a true cyberattack need to be laid out in advance. That should include a documented remediation plan that is regularly reviewed and updated.

It’s also a good idea to have procedures in place for informing employees when a breach has occurred, on a need-to-know basis. The same holds true for informing customers, if the breach could compromise the security of their data.

Keep in mind, it may be necessary to make a public announcement concerning the breach, as a way to control the story rather than have it leak out and be perceived as a scandal. A public relations professional can provide insight on the best ways to handle a breach.

Finally, look to employees not just as people to be trained, but also as a possible source of insights on how you can work together to implement the strongest defense possible. Make it a dialogue, not simply a series of lectures.

About the Author
McClanathan, Burg & Associates, LLC. is a full service accounting firm. Our team members provide services including: Tax, Audit, Assurance and Accounting, Estate and Trust, Forensic Accounting, Litigation Support and Business Valuation.

Social Share

  • google-share

Search

RECENT NEWS

  • IRS Extends the Tax Filing and Paying Deadline for Individuals
  • Do you know the tax impact of your collectibles?
  • Making 2017 retirement plan contributions in 2018
  • When an elderly parent might qualify as your dependent
  • AMT Calculations: It’s Showtime

Categories

  • MBA Events
  • MBA News
  • Opinion & Editorial
  • Resources & Tips

Archives

  • March 2021
  • February 2018
  • January 2018
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013

Social Media

Facebook
Linked In
SavvyCard
Twitter

“Best
Congratulations to this year's honored business!
Featured in the Tampa Bay Times.
Click here to view my profile >>

Categories

  • MBA Events
  • MBA News

Archives

Sign Up For Newsletter

First Name:
Last Name:
Email Address (required):
Company:
Phone Number:
© 2014 McClanathan, Burg & Associates, LLC | Website Design by ThinkTankConnect.com

Send to Mobile

Text or Email McClanathan, Burg & Associates online business card to your mobile device using the form below
From the card you will be able to:
  • Get turn by turn directions to the company's office
  • Access a visual company directory of employee cards
  • Call, email or text the company
  • Share/Refer the company to others
  • Save the card to your phone's home screen for future access