As mentioned in last week’s post, there are numerous similarities when fighting fraud and cybercrime. This week we will highlight a HORNE Cyber blog post that covers five ways to secure your data. Within this blog, cybersecurity advisor Mike Skinner covers areas such as performing a risk assessment, testing vulnerabilities and increasing employee awareness—all areas that can also help business owners and executives fight fraud. Read about all five ways to secure your data in HORNE’s Cyber blog below.
How secure is your business data?
If you’re like many CEOs and CFOs, you hope it’s safe, but you have other, more pressing issues to address. I’ve heard many business leaders explain the reasons hackers wouldn’t be interested in their data: they’re too small, they don’t handle medical records, they don’t process credit cards, or they don’t sell anything over the Internet.
Their reasons for neglecting data security may have been appropriate years ago, but they certainly aren’t applicable today. The theft of information from Ashley Madison, a site that helps people cheat on their spouses, proves that we don’t know what information a hacker might want next. It could be personal information or medical records, or it could be information that could embarrass their targets.
By simply leaking the names of Ashley Madison users, hackers have made life difficult for celebrities, politicians, business leaders, and millions of private individuals. Cyber criminals working for business competitors, some nation states, or criminal rings are looking for a variety of information, including strategic initiatives, research projects, customer names or employee information. Business size no longer matters. Everyone is a potential target.
The problem with waiting to take action until something happens is that it’s too late by then. Once someone is on your network, they can siphon your data in a matter of seconds. Some hackers even stick around for months to see how much data they can get before being detected.
So what can you do to secure your data? Here is an action list of my top five recommendations:
Before you sign a contract, ask your vendors and partners for a SOC 2 Type 2 report outlining the security measures they take. If they can’t provide reports, ask for the right to audit their internal control environment and network security procedures. You can also request that they conduct IT security assessments and provide the results to you. The bottom line is that you must ensure that your partners are working to keep your data secure.
You can’t ignore threats to your data; they aren’t going away. In fact, they will only increase as time goes by. Make sure you’re doing everything you can to protect your data. With these five steps, you can start today!
For weekly insights on fighting financial fraud, click here: