On Point

Cybersecurity Threats Within Your Organization

Posted by Traci Kent on Oct 27, 2017 12:00:00 PM

Cybersecurity Threats Within Your Organization

We are all aware of cybersecurity threats from anonymous persons outside our organization, but have you thought about threats from within your organization? Does your security training include implementing steps to minimize the threats from within? Below are a few examples of inside threats to consider and include in your security awareness program and processes.

Read More

Topics: Data Security

Evaluating Your Cybersecurity Risk

Posted by Traci Kent on Oct 24, 2017 4:12:31 PM

 Your cybersecurity risk may depend on the industry you are in and the size and location of your company. The more employees you have, the more locations, the more complexity and the more personal identifiable data your company maintains. the greater risk of a cybersecurity attack. To determine your company’s risk, you should evaluate the following:

  • If there is a governance model in place for making security decisions?
  • Does the Information Technology department having the right people with the right skills to both proactively prevent attacks and react if an attack occurs?
  • Are the departments aware of security requirements for selecting appropriate technologies?
  • Is there a level of process and program management throughout the company to ensure adherence to security procedures for new implementations?
  • Are employees aware of both facility and IT security controls?
  • Is there a training programs in place for continued employee security education?
  • Does the organization have a sound escalation and response process in place if a security breach occurs?

Evaluating your security risk is the first step in minimizing the impact of a cybersecurity attack.

Don Cornish is the Chief Information Security Officer for Dewpoint. He has an extensive background in IT security architecture and consulting based on his experience for a leading national and global organization. Don has security and compliance consulting experience addressing multinational business entities as well as the small to medium business segments. In addition, he is a Certified Information Systems Security Professional (CISSP).

Read More

Topics: Data Security

Backup and Recovery Tip: Keep Your Storage Options Open

Posted by Traci Kent on Nov 11, 2015 1:55:05 PM

Most companies and organizations these days are not only generating large amounts of data on a regular basis, they are also managing different types of data that require different storage options in terms of recovery and retention. For example, anything involving near term operations, or data that needs to be accessed at a moment’s notice, should be backed up to a high speed disk. Any data that is used for long-term operations should be backed up with tape storage or the cloud.

Read More

Topics: Data Security

Backup and Recovery Tip: Keep One or More Backup Copies Off-Site

Posted by Traci Kent on Nov 11, 2015 1:54:40 PM

It is an unfortunate reality that disaster can strike at any time. Database corruption, hardware failures, and natural disasters are just a few of the situations that threaten your company’s data on a regular basis. No matter how diligent your organization is with performing on-site backups, your data will always be vulnerable. That is why it is recommended to keep one or more backup copies at an off-site location.

Read More

Topics: Data Security

Top Data Security Challenges: A Look at Some Data Security Concerns and Some Helpful Tips

Posted by Kristine Buyers on Apr 8, 2015 9:23:00 AM

Security is a top concern for many enterprises. Your data (and your customers’ data) is very valuable and you need to protect it. Even small business owners are recognizing the importance of protecting their data. Last year eMarketer reported that nearly 40% of small business owners are augmenting their data protection technology.

Read More

Topics: Data Security