Secureworks is proud to be a #CyberAware champion.
Typically challenged with a shortage of technologies, clearly defined processes, and supporting personnel and resources, they live in a reactive world handling the latest operational problem, patching the latest vulnerability, or responding to another compromise.
Unfortunately, in this state, the organization is likely to see continued incidents and the associated degradation of its security posture. While most security professionals do not have the power to increase investments and make organizational changes that will help alleviate the aforementioned situation, they can, with the help of their leaders, drive key low-cost to high reward investments that will improve their security posture.
According to the Identity Theft Resource Center, the number of data breaches tracked in the United States reached an all-time high of 1,579 in 2017. This represents a 44.7% increase over the number of breaches reported in 2016. As of July 2, 2018, there have been 668 breaches consisting of 22,408,258 exposed records.
When an incident occurs, the natural reaction is to think about the short-term impact. Most companies focus on assessing the damage; developing a response; and securing funds to pay for fines, legal fees, consulting third parties, and consumer identity protection services. The real challenge is to mitigate risk to the organization from the long-term effects, such as class-action lawsuits, damage to brand reputation, erosion of consumer trust, and lost business opportunities. This paper takes an in-depth look at the true costs - both short and long term - of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Recent high-profile breaches have resulted in executive shakeups and measurable breach costs as high as nine figures after insurance and deductions. However, calculating the intangible long-term costs is difficult due to the many variables that can negatively impact the bottom line. Organizations that have experienced recent data breaches are still in the process of uncovering these costs, such as: business opportunities lost due to the distraction of these crises, erosion of investor and consumer confidence, abnormal churn, and increased acquisition costs just to name a few. Before delving into these costs and how to assess and develop effective strategies, it's important to understand the nature of the threat.
Make Your Home a Haven for Online Safety
Every day, parents and caregivers teach kids basic safety practices ‒ like looking both ways before crossing the street and holding an adult’s hand in a crowded place. Easy-to-learn life lessons for online safety and privacy begin with parents leading the way. Learning good cybersecurity practices can also help set a strong foundation for a career in the industry. With family members using the internet to engage in social media, adjust the home thermostat or shop for the latest connected toy, it is vital to make certain that the entire household ‒ including children – learn to use the internet safely and responsibly and that networks and mobile devices are secure. Week 1 will underscore basic cybersecurity essentials the entire family can deploy to protect their homes against cyber threats.
Millions of Rewarding Jobs: Educating for a Career in Cybersecurity
A key risk to our economy and security continues to be the shortage of cybersecurity professionals to safeguard our ever-expanding cyber ecosystem. Raising the next generation of interested and capable cybersecurity professionals is a starting point to building stronger defenses. There are limitless opportunities to educate students of all ages – from high school into higher education and beyond – on the field of cybersecurity as they consider their options. In addition, veterans and individuals who are looking for a new career or re-entering the workforce, should explore the multitude of well-paying and rewarding jobs available. Week 2 will address ways to motivate parents, teachers and counselors to learn more about the field and how to best inspire students and others to seek highly fulfilling cybersecurity careers.
It’s Everyone’s Job to Ensure Online Safety at Work
When you are on the job – whether it’s at a corporate office, local restaurant, healthcare provider, academic institution or government agency ‒ your organization’s online safety and security are a responsibility we all share. And, as the lines between our work and daily lives become increasingly blurred, it is more important than ever to be certain that smart cybersecurity carries over between the two. Week 3 will focus on cybersecurity workforce education, training and awareness while emphasizing risk management, resistance and resilience. NCSA’s CyberSecure My Business™ will shed light on how small and medium-sized businesses can protect themselves, their employees and their customers against the most prevalent threats.
Safeguarding the Nation’s Critical Infrastructure
Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems. A disruption to this system, which is operated via the internet, can have significant and even catastrophic consequences for our nation. Week 4 will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe. In addition, it will lead the transition into November’s Critical Infrastructure Security and Resilience Month, which is spearheaded by the U.S. Department of Homeland Security.