Cybersecurity Hygiene: 8 Steps Your Business Should be Taking - 2 minutes read


Cybersecurity Hygiene: 8 Steps Your Business Should be Taking

Whether you’re managing your enterprise’s cybersecurity or you’ve outsourced it to a service provider, you’re ultimately the one that will be held accountable for a data breach. If your vendor loses your data, your customers and board of directors will likely still hold you responsible.

McAfee’s recent report, Grand Theft Data II: The Drivers and Shifting State of Data Breaches, reveals a majority of IT professionals have experienced at least one data breach, and on average have dealt with six breaches over the course of their career. Nearly three-quarters of all breaches have required public disclosure or have affected financial results.

Enterprise threats are increasing in number and sophistication, while rapidly targeting new vulnerabilities. And while, the top three vectors for exfiltrating data were database leaks, cloud applications, and removable USB drives, IT professionals are most worried about leaks from cloud enterprise applications such as Microsoft OneDrive, Cisco WebEx, and Salesforce.com.

Cybersecurity hygiene best practices must not only be established but updated and followed to keep up with these agile, versatile threats. Here are eight steps your business should be taking to implement better cybersecurity hygiene:

For more on how to improve your enterprise’s cybersecurity hygiene using automation, integration, and cloud-based deployment and analytics, check out McAfee MVISION EDR.

Source: Mcafee.com

Powered by NewsAPI.org

Keywords:

Computer securityBusinessComputer securityOutsourcingInternet service providerAccountabilityData breachBoard of directorsIntel SecurityData breachBusinessVulnerability (computing)Vector graphicsDataDatabaseCloud computingRemovable mediaUSB flash driveInformation technologyNews leakEnterprise softwareOneDriveWebExSalesforce.comComputer securityComputer securityBusinessComputer securityAutomationSystem integrationCloud computingSoftware deploymentAnalyticsIntel Security