Monday, March 1, 2021
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Articles
    • See All Articles
    • NEW: COVID-Related
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Leadership and Career
  • Vendor News
  • Jobs
    • Compliance & Risk
    • Information Security
  • Events
    • Webinars & Events
    • Submit an Event
  • Downloads
    • eBooks
    • Whitepapers
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Articles
    • See All Articles
    • NEW: COVID-Related
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Leadership and Career
  • Vendor News
  • Jobs
    • Compliance & Risk
    • Information Security
  • Events
    • Webinars & Events
    • Submit an Event
  • Downloads
    • eBooks
    • Whitepapers
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights

How to Fortify Any Business Against Crippling Cyber Attacks

by Shaun Murphy
June 28, 2016
in Uncategorized
Protecting against cyber risks

Hackers are not only an issue for celebrities with embarrassing photos they don’t want made public. Large corporations are also victims of cybersecurity breaches, and it is an ongoing problem that needs a solution. Trade secrets, internal emails, even unremarkable communications between colleagues can be accessed by criminals and become a major crisis. As recently as May 27, 2016, MySpace passwords were stolen for a price of $2,800, putting the company in a bad light and users at risk.

Cybersecurity breaches can happen at any time to any company. The Security Solutions VP of AT&T, Jason Porter, stated “In 2015, 62 percent of organizations reported having security breaches. Forty-two percent of these businesses said the negative impact on their business was significant. Yet 66 percent of organizations have no effective incident response plan.” Don’t wait until your business is targeted to resolve this problem and protect your valuable data from outside hackers.

The following are tips to help businesses avoid cyber attacks and protect their valuable data:

  1. Back up your data to an external device several times a day and store it for months. Ransomware is spreading like wildfire. If infected, it will lock you out of your data, demanding money to unlock it and most likely transmitting it to other buyers in the meantime. If you have a backup, you’re in good shape to recover your information. Also, don’t use the infected machine without doing a full factory reset!
  2. Make sure all of your devices are using full-disk or full-device encryption with a strong password. If you lose a laptop, phone or tablet, this will make sure that anyone who has it doesn’t get access to your accounts or other data on the device.
  3. Use a strong password. Well, what is a strong password? Never reuse a password. Use a sentence you can memorize instead of a jumble of characters and numbers you’ll need to write down. Here’s an example: “TodayIsTheDayToStartSecurityIn2016!” If you’re really clever, you can come up with something with a modifier on the end that is specific to a website or app, such as: “CorrectHorseBatteryStapleAmazon.com!!”
  4. Make sure you have administrative access to all online accounts and services your employees or consultants use – if they leave the company, you want to make sure they don’t abuse the service or lock you out.
  5. Watch out for new credit card fraud schemes. Now that the credit card chip is here, criminals are getting craftier with internet fraud. If you are in the business of selling or buying items online, be aware of the latest internet fraud techniques: triangulation, re-shipping, phishing, etc. and how to protect yourself from falling victim to these seemingly valid transactions.

Tags: communications management
Previous Post

Does Your Organization Suffer from Process ROT?

Next Post

Who Can Fire a CCO?

Shaun Murphy

Shaun Murphy Shaun Murphy, CEO and inventor of SNDR.com, is one of the nation’s leading experts in communication security with over 20 years experience in the industry. Shaun worked as a subject matter expert on high-level government communications software and hardware systems for numerous agencies. Now, Shaun has dedicated his life to developing technology solutions for the average consumer. His mission is to create a protected communications platform in a world where privacy has almost ceased to exist. Shaun earned his Bachelors of Science in Computer Engineering from the University of Central Florida. He also holds a Master’s of Computer Science from Florida Tech with a concentration in pattern recognition and machine learning in communication systems. For the past decade, Shaun has worked for various contractors in the DoD space, including:

  • Dynamic Animation Systems.  Shaun was with Dynamic Animation Systems for four years working on several cloud projects, publishing research papers and serving as technical expert for various modeling and simulation projects involving high-level communications and automated IT security over cloud communications for an undisclosed project.
  • University of Central Florida. Shaun was an Associate at the Institute for Modeling and Simulation. He spent about four years there, working on research and development over various communication protocols and products for the future combat system and other undisclosed projects.
  • Science Applications International Corporation. Shaun worked on undisclosed communication frameworks and modeling and simulation products.
  • Harris Corporation in Melbourne, Australia. For five years, Shaun worked on government communication systems on undisclosed projects.
He has also held positions at:
  • Vshift, a company that focuses on B2B development of software system projects and contracts. He worked on several projects there, including Best Buy’s netrail.
  • Orlando Science Center. Shaun worked as a UCF contractor, co-designing and developing the MeasureMe exhibit.
  • Elcotel Inc. Shaun designed and implemented automated payphone and communication vulnerability assessments.
About SNDR SNDR™ is a new app that combines all the ways you already communicate into a single platform. You can text, email, share files and use social media all from one app. And every message is encrypted and completely secure. For more information about protecting your security and privacy online, visit: www.sndr.com.

Related Posts

businesswoman presses virtual onboarding button

You Got the Job! Now What?

February 25, 2021
woman looking at horizon from mountain top

What’s on the Horizon for Anti-Corruption Enforcement?

February 25, 2021
red paper plane breaking rank from white paper planes

Diligent to Become Largest Global GRC SaaS Company Through Galvanize Acquisition

February 24, 2021
cannabis leaf on $100 bill

The Intersection of EDD and Banking Cannabis

February 24, 2021
Next Post
Compliance officers at risk of wrongful termination

Who Can Fire a CCO?

Access realtime data
Addressing systemic racism in the workplace SAI Global
Dynamic Risk Assessments with Workiva
Top 10 Risk and Compliance Trends

Special Coverage

Special COVID page graphic

Jump to a Topic:

anti-corruption anti-money laundering/AML Artificial Intelligence/A.I. automation banks board of directors board risk oversight bribery CCPA/California Consumer Privacy Act Cloud Compliance communications management Coronavirus/COVID-19 corporate culture crisis management cyber crime cyber risk data analytics data breach data governance decision-making diversity DOJ due diligence fcpa enforcement actions financial crime GDPR GRC HIPAA information security KYC/know your customer machine learning monitoring ransomware regtech reputation risk risk assessment Sanctions SEC social media risk supply chain technology third party risk management tone at the top training whistleblowing
No Result
View All Result

Privacy Policy

Follow Us

  • Facebook
  • Twitter
  • LinkedIn
  • RSS Feed

Category

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Whitepapers

© 2019 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
  • Articles
  • Vendor News
  • Podcasts
  • Videos
  • Whitepapers
  • eBooks
  • Events
  • Jobs
  • Subscribe

© 2019 Corporate Compliance Insights