2. Emphasize best practices for cybersecurity.
Imagine this scenario: A suspicious email lands in your inbox, and you suspect it might be a phishing attempt. You communicate with your colleagues and ask for their input. You decide to delete the email, share that you received it, and report the problem to your IT department.
Now, would you replicate that same process at home? You should.
With companies now encouraging, or mandating, employees to work from home, they need to ensure cybersecurity follows them. Be diligent about it, because, as stated in the introduction, hackers take advantage of stressful times.
3. Review your incident response plan.
Don't be left without an answer to the question, "If we were hacked, what would we do, how would we communicate and how would we recover?"
An effective cyber incident response plan covers everything from preparation and education to identification and containment to eradication and recovery. Make sure you implement these keys steps and review them regularly.
Here’s a terrifying statistic: The average duration of an incident, from identification to containment, was 279 days in 2019. The longer a breach goes undetected and is allowed to spread, the more damage it inflicts and the more expensive it becomes to resolve. The consequences could be immeasurable, not just to your reputation or how much mitigation efforts cost, but also how it impacts your day-to-day operations, which could suffer immensely.
In fact, 60 percent of small businesses close up shop following a cyberattack—and that was before COVID-19 spread across the world.
Undetected cyberattacks and security breaches are threats to a company's very existence. It is more critical than ever to have the appropriate security measures in place to prevent the worst case scenario from coming true.
The coronavirus pandemic has presented an entirely different challenge than we’ve ever seen before. Make sure in these times of uncertainty, cybersecurity is one less concern.