No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

Defending Against Cybercrime

by Matthew Stockham
May 2, 2017
in Data Privacy, Featured
medieval knight guarding castle

A Look Into Cybersecurity

Network security breaches are never far from the headlines, making cybersecurity a priority for many organizations. In order to protect information from theft, damage and disruptions, organizations must keep their network security up to date, using the best practices and procedures. This article will look deeper into how the enemy works and how you can defend your organization from hackers. 

Corporations around the globe are keeping network security a top priority due to the growing number of famous – or infamous – security breaches happening to other corporations. The hackers are becoming more advanced with their tactics, and they prey on finding gaps and weak spots in network security.

More than ever, hackers are able to successfully strike by targeting outdated technology and relying on human error. Security demands investment, which means having secure systems that are used and implemented correctly. However, it doesn’t matter how powerful or expensive your system is if you don’t know how to properly manage and use it.

As a professional, you need to understand how the enemy works so you can better prepare yourself and be cautious of where the enemy may be. From spam to spear phishing, social engineering and confederates inside the target institutions, these items are all tools hackers are using. Cyber criminals will study your business and habits as they scan for open ports, look for SSL vulnerabilities and do automated testing. All it takes is for an inattentive person to click a link that allows malware in. Over 80 percent of malware that reaches its target is done by phishing or someone clicking a link on a compromised website. Be cautious of what you open and click on, because all hackers need is for one attempt to be successful.

Are you prepared to defend yourself against cyber criminals? Imagine your business is a castle that you must defend on all fronts possible. Be at all of the doors and gates ready to protect yourself against external threats. Consider how a castle is built with several elements of security, and compare those to tactics and procedures your organization can use to protect against hackers. For instance:

  • Moat – Start with a secure base in which nobody has access to your castle. This includes keeping limitations on applications and only granting admin rights to certain individuals and on certain systems. Be sure to audit who has access to certain systems and what they are doing that they need the access for.
  • Drawbridge – In order to gain access to the organization, its systems or its information, users should be required to follow company policies and provide passwords that are complex and in compliance with company standards.
  • Four Outer Walls – Never let your guard down when it comes to cybersecurity. The outer walls are the foundation that helps keep your organization secure.
    1. A single sign-on (SSO) allows users to use one set of login credentials to access multiple applications. SSO is authenticated by a trusted server within the company network.
    2. A multi-factor authentication (MFA) combines something you know, such as a password, with something you have, such as a physical token with an encrypted security code or a message sent to a mobile device. This makes it more difficult for hackers because they must have both items to proceed with their attack.
    3. A firewall serves to monitor and block access of unauthorized users to your organization’s systems or networks.
    4. An IP whitelisting. Compose a list of blocked senders or users, because they can be tied to spam users trying to make an attack.

In addition to securing your castle with these several elements, you should still be on the lookout for hackers that can be lurking just about anywhere. Be aware of your surroundings, especially when working from home or on a mobile device. Do not join public Wi-Fi networks just because you think they look legitimate.

Even if your castle seems secure, know that defense wins championships, and you should still have a detailed game plan of security policies and procedures. Have an in-depth defense consisting of limitations on access, passwords, policies, SSO and MFA. And lastly, be sure to keep your employees educated about cybersecurity and prepared for anything that may come their way.

For more information, check out A Look Into Cyber Security.


Tags: Communications Management
Previous Post

Improving Board Risk Reporting

Next Post

Heroes Don’t Have Comfort Zones

Matthew Stockham

Matthew Stockham

Matthew Stockham currently oversees GTreasury’s product development, technical support and IT operations. Mr. Stockham has over 17 years of experience in development and technology and continues to be asset to growing the GTreasury product. Prior to GTreasury, Matthew worked at Kemper Insurance where he was a developer and responsible for production support of the in-house billing system.

Related Posts

cubist style art of robot holding a pencil

Want to Be Part of the Generative AI Revolution? Start With Treating It Like an Assistant.

by Dave Cumberland
October 31, 2023

Integrating AI into internal communications can streamline how teams talk to each other

stack of newspapers on laptop

The Social Construction of a Scandal

by Michael Toebe
December 9, 2019

Do corporate execs and legal counsel truly understand the role news media plays in establishing the narrative about fault and...

woman holding smartphone with many "like" and "heart" reactions

Engaging Social Media is More Effective Risk Management

by Michael Toebe
October 25, 2019

Social media communication is a rarely implemented risk management tool, but it should get more play. Michael Toebe makes the...

black and white illustration of shark jumping out of water

The Shark in the Wave: Revealing the Lurking Danger of Slack Data

by James Murphy
June 17, 2019

Hanzo’s Jim Murphy explores the danger of Slack data; voluminous, informal, unstructured and context-dependent, it’s a threat hiding in plain...

Next Post
B-25 bomber in flight

Heroes Don’t Have Comfort Zones

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights