{"id":6023,"date":"2020-01-29T11:23:24","date_gmt":"2020-01-29T17:23:24","guid":{"rendered":"http:\/\/tricorps.com\/?p=6023"},"modified":"2021-12-29T21:54:30","modified_gmt":"2021-12-29T21:54:30","slug":"key-areas-for-assessing-your-cybersecurity-risk","status":"publish","type":"post","link":"https:\/\/tricorps.com\/2020\/01\/29\/key-areas-for-assessing-your-cybersecurity-risk\/","title":{"rendered":"Key Areas for Assessing Your Cybersecurity Risk"},"content":{"rendered":"\n
Often, when you click on an article regarding cybersecurity, the first thing you will see is some scary statistic about how vulnerable your organization is to cyberattacks. You\u2019ve clicked on this article, so you are obviously concerned with your organizational cybersecurity. So, let\u2019s skip the scary statistics. I think anyone who spends any time paying attention to the news is well aware of mounting vulnerabilities when it comes to information security. <\/p>\n\n\n\n
In short, the more information we migrate from a physical form to a digital form means the more vulnerable we are. When we lock information in a file cabinet, we only need to secure it from people who could potentially break into the cabinet and steal it. When we toss this information up into the cloud, a whole lot more people have access and opportunity for larceny or defacement.<\/p>\n\n\n\n
Technology is a constant dance between convenience and\nsecurity. Ignoring digital tools would leave an organization far behind the\ncompetition who are using these tools to increase efficiency and experience.\nHowever, as we\u2019ve seen, ignoring or incorrectly aligning organizational\ncybersecurity can have devastating consequences. It\u2019s a dance, a balance. You\nwant not to be afraid to use digital tools to advance but you must also be appropriately\nconsiderate of the risks you face.<\/p>\n\n\n\n
The bottom line is you can\u2019t remediate risks until you\neffectively understand your risks. That\u2019s why a cybersecurity risk analysis is\nfundamental. During a risk analysis, we work with an organization to assess the\nfollowing critical areas of risk. We do so by interviewing a wide diversity of\nteam members from across the organization while also examining relevant\nprocesses and procedures. Understanding and remediating your risks in the\nfollowing areas is critical to effective cybersecurity. <\/p>\n\n\n\n
To adequately protect your data, you must first understand the data that you possess. Then, you must understand where this data is located (both in transit and at rest). You also have to understand who has access to this data (both in-house employees and third-party vendors). Understanding the data you possess, and then ranking your available data by value can help you prioritize what pieces of data require the most protection, so you know where best to channel resources.<\/p>\n\n\n\n
The second way is when a team member clicks\non a link or downloads an attachment in an email that contains malware, or\ninadvertently gives out sensitive information to a \u201cspoofed\u201d account or person.\nThat\u2019s it. The majority of cyberattacks come from these vulnerabilities. Like a\nwhite shirt and blue suit, these attacks are simple, classic, and timeless. <\/p>\n\n\n\n
The \u201chuman firewall\u201d is an organization\u2019s greatest vulnerability. It consists of the human team members who have access to your network. Remediation in this area involves monitoring employees, constantly training them on cybersecurity best practices, and assuring they have access to only the data they need to complete their jobs.<\/p>\n\n\n\n
An organization is only as secure as the\nweakest vendor that has access to its network. It is important for\norganizations to employ the practice of \u201cleast privilege.\u201d This means only\ngiving vendors access to the information that they need to complete the task\nyou have engaged them for. <\/p>\n\n\n\n
New regulations such as the European Union\u2019s General Data Protection Regulation (GDPR) and the recently enacted California Consumer Privacy Act (CCPA) place a greater penalty on organizations that misuse or misplace consumer data. People, as well, are becoming increasingly savvy about their personal information. They want to do business with organizations that treat this data with appropriate significance. A high-profile data breach can be devastating in both financial AND reputational costs.<\/p>\n\n\n\n
Cybersecurity insurance can be murky. For instance, we\u2019ve recently seen insurance companies deny claims for cyber breaches because they argued the breaches came from a foreign government, and therefore the breach was an act of war and excluded from coverage. It is important to have your cybersecurity insurance vetted to ensure you\u2019re properly covered if the worst occurs. <\/p>\n\n\n\n
When we conduct a cybersecurity risk analysis, we meet with\nleaders and others throughout an organization to learn everything we can about its\nvulnerabilities and cyber practices. Then we are able to develop a current\nstate (where an organization currently stands) and its desired future state\n(the level of cybersecurity risk it hopes to achieve). After this, we able to\nplot out a roadmap that allows the organization to get from its current state\nto its desired future state. This can help an organization strategically plan\nto deploy resources in specific areas to best protect itself from the growing\nmenace of cyber risk. <\/p>\n","protected":false},"excerpt":{"rendered":"
Often, when you click on an article regarding cybersecurity, the first thing you will see is some scary statistic about how vulnerable your organization is to cyberattacks. You\u2019ve clicked on this article, so you are obviously concerned with your organizational cybersecurity. So, let\u2019s skip the scary statistics. I think anyone who spends any time paying […]<\/p>\n","protected":false},"author":2,"featured_media":6025,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6023","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"featured_image_src":"https:\/\/tricorps.com\/wp-content\/uploads\/2020\/01\/riskanalysisphoto-1.jpg","featured_image_src_square":"https:\/\/tricorps.com\/wp-content\/uploads\/2020\/01\/riskanalysisphoto-1.jpg","author_info":{"display_name":"Sarah Burrows","author_link":"https:\/\/tricorps.com\/author\/sarahburrowstricorps-com\/"},"_links":{"self":[{"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/posts\/6023"}],"collection":[{"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/comments?post=6023"}],"version-history":[{"count":0,"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/posts\/6023\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/media\/6025"}],"wp:attachment":[{"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/media?parent=6023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/categories?post=6023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tricorps.com\/wp-json\/wp\/v2\/tags?post=6023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}