{"id":20921,"date":"2018-11-16T08:45:51","date_gmt":"2018-11-16T08:45:51","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=20921"},"modified":"2023-08-08T11:14:50","modified_gmt":"2023-08-08T09:14:50","slug":"crucial-tips-from-four-cybersecurity-professionals","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/","title":{"rendered":"Crucial Tips from Four Cybersecurity Professionals"},"content":{"rendered":"<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_desktop_970x300px-1.jpg\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_mobile_500x340px-1.jpg\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>As businesses move further towards solely digital operations and management, the greater the risk of cyberattacks. Accenture\u2019s 2017 Cost of Cyber Crime Study reported that the average annual number of security breaches has increased by 27.4%.<sup>1<\/sup> A report from Cybersecurity Ventures predicts that the global annual cybercrime costs will grow to $6 trillion annually, by 2021.<sup>2<\/sup> As cybercrimes increase, so do the security costs and investments to prevent them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Understanding the threat environment<\/strong><\/h2>\n\n\n\n<p>\u201cOne of the main cyber-risks is to think they don\u2019t exist\u201d, says Stephane Nappo, the Global Chief Information Security Officer at Soci\u00e9t\u00e9 G\u00e9n\u00e9rale International Banking.<sup>3<\/sup> As a digital security expert, Nappo considers cyberthreats a reflection of information and systems weakness. Cyberthreats occur and penetrate the digital gaps, making the need for cyber protection a consistent company initiative.<br>If cyberthreats work to damage or disrupt a computer network or system, then it\u2019s critical for security specialists to identify where the network, software, and hardware vulnerabilities occur.<sup>4<\/sup> Understanding the threat landscape is the first step towards determining risk and investing in security control.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<div id=\"bq-spacing\">\n<p id=\"bq-main-copy\">A report from Cybersecurity Ventures predicts that the global annual cybercrime costs will grow to $6 trillion annually, by 2021.<\/p>\n<\/div>\n<\/blockquote>\n\n\n\n<p>Cybercrimes such as data breaches have the potential to not only affect customers and their future loyalty to the brand, but also the company employees. While implementing appropriate cybersecurity is pertinent to preventing attacks, most cyberattacks are made possible through basic human error.<sup>5<\/sup> Bo Yuan, PhD, Professor, and chair of the Department of Computing Security at Rochester Institute of Technology says, &#8220;An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction&#8221;.<sup>6<\/sup> Equifax, the consumer credit reporting agency, felt the full force of their 2017 data breach, the attack compromised data from 147 million consumers, costing the company over $600 million.<sup>7<\/sup> The breach was credited to human error and software bugs. Despite having processes to fix tech failures and catch hackers, these processes failed leading up to the data breach. The company was informed of the software vulnerability, with instructions to fix it within 48 hours. They failed to fix it, and the attack occurred just a few days afterwards on 12 May. The company only caught the hackers on the system on 29 July, almost 3 months later.<sup>8<\/sup><\/p>\n\n\n\n<p>Jeremiah Grossman, the Chief of Security Strategy at SentinelOne, stresses the basic nature of how cyberattacks occur from mistakes made within the organisation itself, often by employee negligence, \u201cWhen a company gets hacked, it\u2019s largely because there\u2019s a computer, a box, a website that they didn\u2019t know they owned\u201d.<sup>9<\/sup> Grossman\u2019s cybersecurity advice is simple yet smart: do an inventory of every business asset. Systematically identifying computers and other devices can determine what resources are online, and where the risks might occur. His advice for IT security staff is to <strong>know exactly what is being protected.<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<div id=\"bq-spacing\">\n<p id=\"bq-main-copy\">An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction.<\/p>\n<p id=\"bq-name-copy\"><span id=\"bq-name\">BO YUAN<\/span><br>PHD, PROFESSOR, AND CHAIR OF THE DEPARTMENT OF COMPUTING<br>SECURITY AT ROCHESTER INSTITUTE OF TECHNOLOGY<\/p>\n<\/div>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Securing your network<\/strong><\/h2>\n\n\n\n<p>As the internet of things grows, so does our interconnectivity. It\u2019s been predicted that the number of connected Internet of Things (IoT) devices globally will grow from 27 billion in 2017, to 125 billion in 2030.<sup>10<\/sup> Just one average device contains over 20 identified security risks.<sup>11<\/sup> As technology advances, identifying software gaps in time has become a major industry challenge. A report developed by the Center for Strategic and International Studies, in partnership with McAfee concluded that close to $600 billion is lost to cybercrime each year.<sup>12<\/sup> <strong>Will technology always be one step ahead of the curve?<\/strong><\/p>\n\n\n\n<p>Before spending thousands on firewalls and cybersecurity technology, companies need to accurately evaluate their assets. Securing the foundations is pivotal in ensuring cyber safety. Nappo considers the \u2018back-to-basics\u2019 approach to cybersecurity the most effective.<sup>13<\/sup> Organisations should protect the basics, before \u201cinvesting in \u2018Star-Wars\u2019 technology\u201d as he phrases it.<sup>14<\/sup><\/p>\n\n\n\n<p>The threat of company data breaches is initiating dedicated cybersecurity campaigns. Financial Times estimates that, \u201cHigh-profile data breaches will lead two-thirds of companies to raise their budgets for cybersecurity by at least 5 per cent over the next year.\u201d<sup>15<\/sup> Although it\u2019s imperative to invest in cybersecurity technology, investing in cybersecurity training is just as necessary. Security shouldn\u2019t be relegated to the IT basement; a security strategy should involve all employees and urge them to participate in working with security systems. Since the majority of data breaches are caused by employee negligence and human interaction, it\u2019s vital that professionals are aware of the potential for cybercrime, so that they can be cognisant of how they can put their business at risk. Joseph Blankenship, an analyst at Forrester, says that among all the systems of data management and protection, he hasn\u2019t seen a programme \u201cI don&#8217;t think we\u2019ve effectively seen a system that can effectively cut the human out of the loop\u201d.<sup>16<\/sup> The cybersecurity industry is set to exponentially expand, increasing the demand for specialists. It\u2019s predicted that by 2021, there will be 3.5 million unfilled cybersecurity positions.<sup>17<\/sup> The digital movement forces society to consider, how will you manage this new cyber environment?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<div id=\"bq-spacing\">\n<p id=\"bq-main-copy\">It&#8217;s predicted that by 2021, there will be 3.5 million unfilled cybersecurity positions.<\/p>\n<\/div>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cybersecurity tips to protect your business<\/strong><\/h2>\n\n\n\n<p>Although businesses on the Fortune 500 may store extremely valuable data and assets, making an attack more enticing for hackers, small businesses aren\u2019t outside of the threat landscape. Despite having less data, cyberattacks on small businesses can be crippling. From a poll conducted by Manta, 1420 small business owners were asked whether they thought their business was at risk of being hacked, 87% didn\u2019t think so.<sup>18<\/sup> Regardless of this assumption, small businesses are prime targets for hackers. Their small size, lack of dedicated security professionals and minimal data defence budgets make cyber attacks far easier, and more devastating, compared to those directed to large corporations. However, cybersecurity doesn\u2019t have to be a major financial liability. Cybersecurity begins with the essentials.<\/p>\n\n\n\n<p>These <strong>cybersecurity tips<\/strong> identified by the U.S. Department of Homeland Security may account for defending your organisation:<sup>19<\/sup><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Improve your password security<\/strong><\/h3>\n\n\n\n<p>Chris Pirillo, founder and CEO of LockerGnome said, \u201cPasswords are like underwear: don\u2019t let people see it, change it very often, and you shouldn\u2019t share it with strangers\u201d.<sup>20<\/sup> Creating a strong and unique password for each device and establishing a two-step authentication could stop most cyberattack attempts. As most businesses operate online and over email, this precaution could eliminate data or network compromises.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Operate on secure networks<\/strong><\/h3>\n\n\n\n<p>Public networks naturally access your private data. Secure your WiFi and choose your internet services carefully. Chris Wysopal, the Chief Technology Officer at Veracode, urges the importance of operating on safe platforms, \u201cDon\u2019t put data out there, into Facebook or something, unless you really want to share that out to the world\u201d.<sup>21<\/sup> Not all technology is to be trusted, and more often than not, it\u2019s compromised in some manner.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Don\u2019t fall prey to phishing<\/strong><\/h3>\n\n\n\n<p>Phishing emails are one of the biggest risks to online users.<sup>22<\/sup> Phishing works to create legitimate emails that once clicked, open a gateway to accessing your information, your assets, or installing malicious software on your device. In order to combat these risks, companies need to educate employees on what constitutes phishing and other malware traps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Create employee awareness<\/strong><\/h3>\n\n\n\n<p><em>Forbes<\/em> urges businesses to implement cyber training. Informing your organisation about the potential security risks will help ensure a cybersecurity policy is understood, and maintained. Once a policy has been created, employees will recognise what cybersecurity best practice entails, the safety procedures, and protocols for security breaches.<\/p>\n\n\n\n<p>Updating computers and creating backups also appear among the top cybersecurity tips. Installing your devices with the latest software could ensure you\u2019re protected from the latest threats.<sup>24<\/sup> Religiously making information backups means that if your data is accessed or lost, you\u2019ll be able to recover it.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<div id=\"bq-spacing\">\n<p id=\"bq-main-copy\">Organisations that fail to protect data and breach GDPR can be fined 4% of annual global turnover, or \u20ac20 million, whichever is greater.<\/p>\n<\/div>\n<\/blockquote>\n\n\n\n<p>Educating yourself about cybersecurity threats and the potential damage is arguably the best protection strategy. Despite the majority of security compromises coming from human error, individuals won\u2019t avoid the consequences.<sup>25<\/sup> Andrew Jones, Senior Sales Engineer at Shape Security says getting fired for cyber negligence is a reality, \u201cThis is exactly what can happen if you fall victim to an email phishing campaign or other social engineering attack and become the vector by which your company exposes sensitive information\u201d.<sup>26<\/sup> The risk is so serious, that data protection has become an enforced regulation within the European Nation. The General Data Protection Regulation (GDPR) is a set of data protection rules for all companies operating in the EU as well as global companies with EU customers.<sup>27<\/sup> Organisations that fail to protect data and breach GDPR can be fined 4% of annual global turnover, or \u20ac20 million, whichever is greater.<sup>28<\/sup> The pressure to protect is as much a matter of reputation, as a financial imperative.<\/p>\n\n\n<div class=\"related-programme-block\">\n<div class=\"related-programme\" onclick=\"window.open('https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course', '_blank')\">\n    <div class=\"row\">\n        <div class=\"col-12 col-md-11\">\n            <div class=\"related-programme__school-logo-container\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-logo-link\">\n                <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/HAR_VPAL_black_variant.png\" alt=\"School Logo\" class=\"related-programme__school-logo\">\n            <\/a>\n            <\/div>\n            <div class=\"related-programme__copy\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-name\">\n                HARVARD'S VPAL            <\/a><br>\n            <a href=\"https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course\" target=\"_blank\" class=\"related-programme__programme-name\">\n                Cybersecurity: Managing Risk in the Information Age online short course            <\/a>\n            <\/div>\n        <\/div>\n        <div class=\"col-md-1 related-programme__chevron-column\">\n            <div class=\"related-programme__icon-container\">\n                <img decoding=\"async\" class=\"add-btn\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/themes\/blog\/assets\/icn_arrow-circle_right.svg\" alt=\"Read More Icon\">\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n<p>Cybersecurity practices aside, perfect online barriers are unattainable. Attacks are becoming more sophisticated and advancing at a pace that cannot always be detected. Ted Schlein, a venture capitalist with Kleiner Perkins Caufield &amp; Byers, has a simple way of categorising companies; \u201cMost people are starting to realise that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don\u2019t know it\u201d.29 The 2017 Cost of Data Breach Study discovered the average length of time to detect an organisation data breach is six months.<sup>30<\/sup> The same study identified it takes 66 days to contain a data breach. <strong>Imagine the extent of digital damage and long-term business implications that occur within 191 days?<\/strong> It seems like self-sabotage to not consider the simple cybersecurity tips from industry experts.<\/p>\n\n\n\n<p>What does the future of cybersecurity look like? Cybersecurity is intrinsically connected to cyberspace, as one advances, so the other attempts to combat it. As the digital landscape expands, the number of devices and network structures do too.<sup>31<\/sup> As data increases, the need for more powerful cybersecurity will as well.<\/p>\n\n\n\n<p>As security roles within the industry increases, the potential for artificial intelligence and machine-based protection is similarly growing. Machine learning algorithms that analyse large sets of data can survey networks and be trained to react to different scenarios.<sup>32<\/sup> However, machines against machines pose a number of issues still to be resolved.<\/p>\n\n\n\n<p>What\u2019s for certain within the digital revolution is every business and person carries information that is valuable. Adopting cybersecurity is going to be a personal and professional commonplace, a habit as common as locking your front door. Cybercrime is particularly sinister. Its mysterious ways work to only reveal itself once the damage is done. Despite the complexity of a cyber network and the necessary security, implementing the basic cybersecurity advice found above and online, can win you half the battle. What will you do to protect your business?<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>1<\/sup> (2017). \u20182017 cost of cyber crime study\u2019. Retrieved from <a href=\"https:\/\/www.accenture.com\/t20170926T072837Z__w__\/us-en\/_acnmedia\/PDF-61\/Accenture-2017-CostCyberCrimeStudy.pdf\" target=\"_blank\" rel=\"noopener\">Accenture.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>2<\/sup> Morgan, S. (Aug, 2018). \u2018Hackerpocalypse: A cybercrime revelation\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-original-cybercrime-report-2016\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>3<\/sup> (Aug, 2018). \u2018Top 27 cyber security quotes\u2019. Retrieved from <a href=\"https:\/\/securityfirstcorp.com\/cyber-security-quotes\/\" target=\"_blank\" rel=\"noopener\">Security First Corp. <\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>4<\/sup> Begin the conversation: Understand the threat environment\u2019. Retrieved from U.S <a href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/c3vp\/smb\/Understanding_the_Threat_Landscape.pdf\" target=\"_blank\" rel=\"noopener\">Department of Homeland Security.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>5<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/#7dc835905d00\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>6<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/#7dc835905d00\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>7<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/#7dc835905d00\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>8<\/sup> Hautala, L. (Oct, 2017). \u2018Equifax ex-CEO: Here&#8217;s what went wrong\u2019. Retrieved from <a href=\"https:\/\/www.cnet.com\/news\/equifax-ceo-data-breach-heres-what-went-wrong\/\" target=\"_blank\" rel=\"noopener\">CNET.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>9<\/sup> Kan, M. (Feb, 2017). \u2018The best cybersecurity advice from experts at RSA\u2019. Retrieved from <a href=\"https:\/\/www.pcworld.com\/article\/3171280\/security\/experts-at-rsa-give-their-best-cybersecurity-advice.html\" target=\"_blank\" rel=\"noopener\">PC World.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>10<\/sup> (2017). \u2018The Internet of Things: a movement, not a market\u2019. Retrieved from <a href=\"https:\/\/cdn.ihs.com\/www\/pdf\/IoT_ebook.pdf\" target=\"_blank\" rel=\"noopener\">IHS Markit.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>11<\/sup> Chambers, J and Stewart, N. (Jul, 2015). \u2018Why cybersecurity leadership must start at the top\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/frontline\/2015\/07\/13\/why-cybersecurity-leadership-must-start-at-the-top\/#25bebb1e18ab\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>12<\/sup> Lewis, J. (Feb, 2018). \u2018Economic impact of cybercrime\u2019. Retrieved from <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/restricted\/rp-economic-impact-cybercrime.pdf?utm_source=Press&amp;utm_campaign=bb9303ae70-EMAIL_CAMPAIGN_2018_02_21&amp;utm_medium=email\" target=\"_blank\" rel=\"noopener\">CSIS.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>13<\/sup> Nappo, S. (Dec, 2019). \u2018Sometimes less is more\u2026\u2019. Retrieved from <a href=\"https:\/\/www.linkedin.com\/pulse\/sometimes-less-more-st%C3%A9phane-nappo\/\" target=\"_blank\" rel=\"noopener\">Linkedin.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>14<\/sup> Nappo, S. (Dec, 2019). \u2018Sometimes less is more\u2026\u2019. Retrieved from <a href=\"https:\/\/www.linkedin.com\/pulse\/sometimes-less-more-st%C3%A9phane-nappo\/\" target=\"_blank\" rel=\"noopener\">Linkedin.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>15<\/sup> Ram, Alia. (Oct, 2018). \u2018Data breaches persuade companies to raise cyber security budgets\u2019. Retrieved from <a href=\"https:\/\/www.ft.com\/content\/819bc1d0-cbcc-11e8-9fe5-24ad351828ab\" target=\"_blank\" rel=\"noopener\">Financial Times.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>16<\/sup> Ram, Alia. (Oct, 2018). \u2018Data breaches persuade companies to raise cyber security budgets\u2019. Retrieved from <a href=\"https:\/\/www.ft.com\/content\/819bc1d0-cbcc-11e8-9fe5-24ad351828ab\" target=\"_blank\" rel=\"noopener\">Financial Times.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>17<\/sup> Morgan, S. (May, 2017). \u2018Cybersecurity jobs report 2018-2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>18<\/sup> (Mar, 2017). \u2018Are small business owners protecting themselves from cyber attack?\u2019. Retrieved from <a href=\"https:\/\/www.manta.com\/resources\/small-business-trends\/small-business-owners-protecting-cyber-attack\/?dest=%2Fresources%2Fsmall-business-trends%2Fsmall-business-owners-protecting-cyber-attack%2F\" target=\"_blank\" rel=\"noopener\"> Manta.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>19<\/sup> (2018). \u2018Good security habits\u2019. Retrieved from U.S. <a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-003\" target=\"_blank\" rel=\"noopener\">Department of Homeland Security.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>20<\/sup> (2018). \u2018Top 27 cybersecurity quotes\u2019. Retrieved from <a href=\"https:\/\/securityfirstcorp.com\/cyber-security-quotes\/\" target=\"_blank\" rel=\"noopener\">Security First Corp.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>21<\/sup> Kan, M. (Feb, 2017). \u2018The best cybersecurity advice from experts at RSA\u2019. Retrieved from <a href=\"https:\/\/www.pcworld.com\/article\/3171280\/security\/experts-at-rsa-give-their-best-cybersecurity-advice.html\" target=\"_blank\" rel=\"noopener\">PC World.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>22<\/sup> (2018). \u2018Good security habits\u2019. Retrieved from U.S. <a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-003\" target=\"_blank\" rel=\"noopener\">Department of Homeland Security.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>23<\/sup> Kappel, M. (Nov, 2017). \u20185 ways to improve your small business cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/mikekappel\/2017\/11\/08\/5-ways-to-improve-your-small-business-cybersecurity\/#95fefe61f6f2\" target=\"_blank\" rel=\"noopener\">Forbes<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>24<\/sup> Kappel, M. (Nov, 2017). \u20185 ways to improve your small business cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/mikekappel\/2017\/11\/08\/5-ways-to-improve-your-small-business-cybersecurity\/#95fefe61f6f2\" target=\"_blank\" rel=\"noopener\">Forbes<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>25<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/#7dc835905d00\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>26<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/#7dc835905d00\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>27<\/sup> Retrieved from <a href=\"https:\/\/ec.europa.eu\/commission\/priorities\/justice-and-fundamental-rights\/data-protection\/2018-reform-eu-data-protection-rules_en#abouttheregulationanddataprotection\" target=\"_blank\" rel=\"noopener\">European Commission. <\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>28<\/sup> \u2018GDPR key changes\u2019. Retrieved from <a href=\"https:\/\/eugdpr.org\/the-regulation\/\" target=\"_blank\" rel=\"noopener\">EU GDPR.ORG<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>29<\/sup> (Aug, 2018). \u2018Top 27 cybersecurity quotes\u2019. Retrieved from <a href=\"https:\/\/securityfirstcorp.com\/cyber-security-quotes\/\" target=\"_blank\" rel=\"noopener\">Security First Corp.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>30<\/sup> (2017). \u20182017 cost of data breach study\u2019. Retrieved from <a href=\"https:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=SEL03130WWEN&amp;\" target=\"_blank\" rel=\"noopener\">IBM.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>31<\/sup> (Jul, 2018). \u2018Meeting cyber security challenges in a connected world\u2019. Retrieved from <a href=\"http:\/\/www.itnewsafrica.com\/2018\/07\/meeting-cyber-security-challenges-in-a-connected-world\/\" target=\"_blank\" rel=\"noopener\">IT News Africa.<\/a><\/li>\n<li class=\"mb-4\"><sup>32<\/sup> Newman, L. (Apr, 2018). \u2018AI can help cybersecurity &#8211; if it can fight through the hype\u2019. Retrieved from <a href=\"https:\/\/www.wired.com\/story\/ai-machine-learning-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Wired.<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As businesses move further towards solely digital operations and management, the greater the risk of cyberattacks. Accenture\u2019s 2017 Cost of Cyber Crime Study reported that the average annual number of security breaches has increased by 27.4%.1 A report from Cybersecurity Ventures predicts that the global annual cybercrime costs will grow to $6 trillion annually, by [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":20965,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[122,120],"article-format":[],"class_list":["post-20921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","tag-business-management","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Crucial Tips from Four Cybersecurity Professionals - GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"Four experienced cyber security professionals weigh in on the threat environment and offer tips and advice on keeping your business information safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crucial Tips from Four Cybersecurity Professionals\" \/>\n<meta property=\"og:description\" content=\"Four experienced cyber security professionals weigh in on the threat environment and offer tips and advice on keeping your business information safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-16T08:45:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-08T09:14:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/crucial-tips-from-four-cybersecurity-professionals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/crucial-tips-from-four-cybersecurity-professionals\\\/\"},\"author\":{\"name\":\"Shameel Mohanlal\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/#\\\/schema\\\/person\\\/527df7e5676f2bfa7c943e1653764bff\"},\"headline\":\"Crucial Tips from Four Cybersecurity Professionals\",\"datePublished\":\"2018-11-16T08:45:51+00:00\",\"dateModified\":\"2023-08-08T09:14:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/crucial-tips-from-four-cybersecurity-professionals\\\/\"},\"wordCount\":2235,\"image\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/crucial-tips-from-four-cybersecurity-professionals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg\",\"keywords\":[\"Business &amp; management\",\"Systems &amp; technology\"],\"articleSection\":[\"Career Advice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/crucial-tips-from-four-cybersecurity-professionals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg\",\"contentUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg\",\"width\":500,\"height\":340},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/crucial-tips-from-four-cybersecurity-professionals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Crucial Tips from Four Cybersecurity Professionals - GetSmarter Blog","description":"Four experienced cyber security professionals weigh in on the threat environment and offer tips and advice on keeping your business information safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/","og_locale":"en_US","og_type":"article","og_title":"Crucial Tips from Four Cybersecurity Professionals","og_description":"Four experienced cyber security professionals weigh in on the threat environment and offer tips and advice on keeping your business information safe.","og_url":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/","og_site_name":"GetSmarter Blog","article_published_time":"2018-11-16T08:45:51+00:00","article_modified_time":"2023-08-08T09:14:50+00:00","og_image":[{"width":500,"height":340,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg","type":"image\/jpeg"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/#article","isPartOf":{"@id":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/"},"author":{"name":"Shameel Mohanlal","@id":"https:\/\/www.getsmarter.com\/blog\/#\/schema\/person\/527df7e5676f2bfa7c943e1653764bff"},"headline":"Crucial Tips from Four Cybersecurity Professionals","datePublished":"2018-11-16T08:45:51+00:00","dateModified":"2023-08-08T09:14:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/"},"wordCount":2235,"image":{"@id":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg","keywords":["Business &amp; management","Systems &amp; technology"],"articleSection":["Career Advice"],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg","width":500,"height":340},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/20921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=20921"}],"version-history":[{"count":36,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/20921\/revisions"}],"predecessor-version":[{"id":50202,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/20921\/revisions\/50202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/20965"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=20921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=20921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=20921"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=20921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}