Get On top Of Your Cyber Security |Stephen Elbourn

Stephen Elbourn

Apr 07,2020 | 10 mins read

Stephen Elbourn
#Business #Leadership

Network and Cyber security can be confusing topics if you have not been exposed to the industry. Hearing things like ‘cyber threats’, ‘cyber security’, ‘privacy breaches’, ‘credential harvesting’ and ‘phishing’ can all be terrifying if we don’t know how to properly deal with them. Handling these things can be hard enough, but equipping yourself with the knowledge needed starts with finding out where these cyber security breaches can come from. 

For businesses there are three main types of risk

  • Individuals just having fun and seeing what they can do.
  • Businesses who want to get financial benefit from hacking into your business and stealing and selling your data.
  • State sponsored attacks.

The biggest threat to a corporation being individuals and businesses coming from the second category.

Ok, well as an individual or business owner what can I do to keep myself safe?

When it comes to online data security, there are two main types 

Network Security  

This is the type that most companies have a firm grasp on. This includes having firewalls and a multilayer protection approach stopping threats coming from the outside in.

Cyber Security 

With this, it is your staff that is the biggest threat. They can be a risk to your organization if they open an email, click on a link or don’t have a strong password. 

There are a few things that you need to be aware of when it comes to online security. These are

  1. Password Maintenance

This includes Changing Passwords Frequently and having the maximum characters possible for your password. If a hacker finds your password (and if you have used this same password for multiple accounts), this individual can access all your data and details

  1. Phishing

A hacker can pose as your bank, send you an email and ask you to enter some details. If you click on that link, anyone on the other end of that email now has access to your details, which they can store or sell. This is known as credential harvesting. 

So what do we suggest?

Invest In training

Spend time or money looking into your cyber security process. With this process, look at;

  1. Yourself
  2. Your Board
  3. Your Staff

The steps to take when doing this are (1) analyse the current risks of your business, (2) How do we address those risks, and (3) What will it cost us?

The end result you as a board member should get is the ability to answer these four questions

  1. Do we understand how cyber security impacts our collective and individual responsibility
  1. As an organization, who currently has responsibility for cyber security
  1. As a board, how do we ensure that our cyber security measures are effective
  1. As an organization, do we have a process which ensures that our cyber risk is integrated with our business risk.

About the Creator

The world is changing rapidly and for those interested in an IT career, the traditional technologies are a starting point, but the adoption of new technologies will mean that those of you starting out will need to engage in a lifetime of learning and be willing to learn at a pace that can match the industrial revolution 4.0 to remain relevant and employable throughout what will be a career of more than 40+ years. At ITIC LIVE we are building training and work experience programs to support you through this journey. We do the basics like networking, security, data centre, virtualisation and wireless, whilst developing advanced learning programs in cybersecurity, software development, IoT, big data, data science and AI/ Machine Learning. Our LIVE (Learning Integrated Vocational Experience) programs will allow you to work with us and work with our host companies to develop into the genius at work that you would like to be and open up the opportunities in your career that you desire. We work with leading Universities on joint research projects that provide you with a unique opportunity to get involved in interesting projects that will give you the tools and experience that you need to be successful in moving from academic study into full-time work in your field of choice. How can our programs work for you? Because we combine an initial certification training program to give you valuable industry recognised credentials, then follow that with a work experience program, after attending our program you will have valuable skills to approach prospective employers with a far more compelling CV. The boxes you can now tick, should get you through the initial steps of the recruitment process and into the interview rounds. During your interview you will now have the opportunity to talk about your project work, show your industry credentials and references and therefore maximise your chances of success.