This is the second article in our series for National Cyber Security Awareness Month. To read the first article, click here.
Interconnectivity is fundamental to modern life. On a grand scale, the systems supporting our transportation, telecommunications, banking and other necessities all rely on their ability to connect. Every day, even before we power up our laptops and smartphones, we depend on a properly functioning network infrastructure.
The same is true within many organizations, which rely on complex networks for data sharing and third-party connections for daily functioning and core operations. To stay competitive, organizations have needed to adapt to the mobile revolution, allowing employees to connect to their networks through mobile devices. And while this change has helped make workforces more flexible and productive, it has also led to a more complicated networking arrangement.
Recent news and analysis offer some pointed examples of how problems can arise with the extended connectivity fundamental to modern business. In the massive breach of Target’s network, for instance, cyber criminals found their point of entry through a remote connection owned by an HVAC vendor. Further, researchers claim that mobile devices are now, and will continue to be, a significant source of vulnerabilities for corporate networks.
This month, in our efforts to increase your organization’s cyber security awareness, there are a few important steps you can take to improve the security of your critical infrastructure.
1. Know your providers. As in the Target example, cyber criminals are increasingly honing in on companies’ third-party vendors to find a way into networks. Lunarline offers complete vendor audits to ensure you catch weak links before they become a major issue.
2. Get your plans in order. Protecting your infrastructure includes quick and decisive action in the event of a major breach. To be prepared, you need to develop a breach response plans and make sure all parties involved have a clear understanding of their roles and responsibilities.
3. Enhance mobile security. Out of the box, many mobile devices are not up to the proper standards of most organizations’ security programs. This means you need to identify mobile security risks and develop a tailor plan for addressing them.