« Business Continuity, Disaster Recovery

October is ‘Cyber Security Awareness Month’

Business owners should look into protecting their electronic assets because data breaches are becoming more common.
Business owners should look into protecting their electronic assets because data breaches are becoming more common.

The internet has become a large part of everyone's lives. We use it for professional and personal purposes, which means that we are "logged on" for a majority of the day. Websites and servers have expedited business workflow, but are these networks secure?

As a way to educate businesses and the general public about cyber security, the Department of Homeland Security (DHS) will celebrate its 10th annual "Cyber Security Awareness Month." For the next five weeks, business owners are invited to attend seminars to educate themselves on how to improve their business continuity plans.

"Together, we can maintain a cyberspace that is safer and more resilient, and that remains a source of tremendous opportunity and growth for years to come," the DHS' website stated.

There are many types of cyber attacks, but all of them cause harm to a business' credibility to its clients and colleagues. Experian Data Breach Resolution told attendees at the International Association of Privacy Professionals Academy some of the most common cyber security mistakes. Changing any of these habits can significantly decrease an organization's chances of getting hacked.

Forgetting to secure outside vendors, agencies

Businesses have many partners that provide goods and services to their workflow. As a way to protect the company, Experian suggests to ask if they have a resolution already in place.

"[I]t is important to think about the integrity and security standards of a vendor before aligning the company brand with it," Experian vice president Michael Bruemmer said in the press release.

Not practicing the plan

The only way to figure out the kinks behind the business continuity plan is if all employees, executives included, participate in table top exercises. All staffers should understand their role if a possible cyber attack occurs. Knowing the steps before the issue occurs will help ensure a faster recovery.