博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Why Your Current Security Infrastructure Isn't Cutting It
阅读量:6239 次
发布时间:2019-06-22

本文共 3467 字,大约阅读时间需要 11 分钟。

Why Your Current Security Infrastructure Isn't Cutting It

14944057b486c6a12d23ab32ef32d0472a4ab255

2016 was an apocalyptic year in terms of big organizations being plagued by data theft. Throughout the year, news came out about how user account information had been stolen from some of the most eminent organizations in the world. These included hackers stealing the details of around (the largest data breach in history), , , and . Often the breaches had occurred in the decade earlier, but only came to light after hackers tried to sell the stolen credentials in 2016 on the dark web.

After the data breaches were disclosed, the organizations concerned issued statements urging their users to change their password and login information in order for their accounts not to be compromised. But the damage done to the reputation of these organizations, and their profit margins, may take a long time to repair. According to the research firm Alertsec, it will take Yahoo many months before it regains the trust of its users. The firm also found that 97% of Americans lose trust in companies which are subject to substantial data breaches.

You may believe that your business is relatively safe from data breaches. After all, the companies cited above are all massive organizations and it’s easy to assume that hackers are more attracted to the most famous enterprises rather than small and medium-sized businesses. In fact, the opposite is true. reveals that small and medium-sized businesses are actually the principal targets of cybercrime and are subject to the most attacks! The main reason is because hackers view smaller businesses as having less robust security mechanisms in place due to their lesser amount of financial resources, making them easier targets.

And the hackers would be right. The same government study revealed that many smaller businesses have weak or even nonexistent security protocols in place. This kind of indifference towards cybersecurity is perilous in a climate where hackers are getting bolder by the minute, and could result in serious negative ramifications for your business in terms of reputation as it did for Yahoo, or crippling financial ones. In terms of cost, the average cost of a data breach for an organization is .

There are a number of security measures your business can take to prevent your sensitive data from being leaked. A straightforward one is making sure your employees don’t reuse passwords. In fact, the occurred because a DropBox employee used the same password for their work account as they did for their personal LinkedIn account. When LinkedIn suffered a data breach, hackers were able to acquire that password and then use it to gain access to the customer database of DropBox!

It is also useful to move beyond just passwords. Two-step authentication methods, where your employees have to enter a password but also need to have their identity verified through some additional measure (such as using their cellphone) are a good means of increasing security.

Lastly, it is important to restrict downloads from your servers only to parties who categorically need that data, since hackers frequently find their way into corporate systems by hijacking third parties who also have access to those systems.

No business is too small or unimportant to be safe from predatory hackers. Protect the data of your business by ensuring your security infrastructure is up to an adequate standard. Implementing the steps mentioned above is a great way to start.

转载地址:http://qocia.baihongyu.com/

你可能感兴趣的文章
html5-css综合练习
查看>>
嵌入式开发之cgic库---cgi库的使用
查看>>
clickhouse安装 Requires: libstdc++.so.6(GLIBCXX_3.4.19)(64bit)
查看>>
FFT快速傅立叶变换
查看>>
<刘未鹏 MIND HACKS>读书笔记
查看>>
locate
查看>>
AceyOffice教程--如何判断单元格的内容
查看>>
前端 -- 超链接导航栏案例
查看>>
软工网络15个人作业
查看>>
css 兼容性写法,CSS hack写法
查看>>
剑指offer 之 C/C++基础知识1
查看>>
(KMP 暴力)Corporate Identity -- hdu -- 2328
查看>>
Silverlight程序中访问配置文件
查看>>
Linux下利用rsync实现多服务器文件同步
查看>>
2.3 Rust函数
查看>>
1.3 IDAE 中使用GO开发项目
查看>>
Activity、Fragment、ViewPage
查看>>
《信息安全系统设计基础》课程总结
查看>>
衣码对照表
查看>>
Vue-Router导航守卫
查看>>