Don’t Believe Every Myth You Hear

Myth_Fact image
The truth is that a breach will happen to your company; it’s just a matter of knowing how well you’re prepared to minimize the amount of damage it can cause.

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

Don't Believe Every Myth You Hear

There is this overarching sentiment that an incident that will negatively affect your environment will not happen to your organization. You have an IT person, so you’re protected. You are smaller than the companies seen on the news that were breached.

The truth is that a breach will happen to your company.

It’s just a matter of knowing how well you’re prepared to minimize the amount of damage it can cause.

Many high-profile breaches (Target, Home Depot, Equifax, etc.) originated with problems in the architecture, controls, and internal process, rather than a lack of tools. Did you know it was really the HVAC company working in Target that was originally breached? Target wasn’t the initial victim. These highly visible events have been devastating for brands but have taught us many things. One being the unexpectedness of each attack and the brutal outcomes.

One outcome of a breach is costs associated with remediation, perceived brand worth, and revenue loss. When this happens to corporate companies, like the brands above, they usually bounce back. But what does a threat this big mean to a significantly smaller company that may not have the same resources? Is your brand strong enough and resilient enough to bounce back? Sadly, this is not an uncommon situation, but one that should be averted.

Here are some questions to start thinking about how to improve your network and security:

  • What data (i.e. clinical trials, credit card information, finances) is most important to your company?                
  • Do you have proper firewall segmentations in place to make sure that you can limit the impact? 
  • How well-managed and monitored is your environment?
  • Do you know if someone is lurking in your network as we speak?

Once you’ve answered these questions, take the time to do a proper network and/or security assessment. Technium can certainly help you navigate this process if needed. Contact us to get started.

Myth_Fact image

Systems vs. Software

Finding an out-of-the-box software to resolve gaps in your current cyber security state appears easy. The hard part is ensuring the systems and people are in place to do the work.

Read More »

Choosing the Right MSP

To understand how your Managed Services Provider (MSP) stacks up from a security standpoint, here are some levels, observations, and questions to identify what you may currently have.

Read More »

DIY Security: Know When to Call in Experts

Deciding between keeping IT security tasks in-house or relying on a partner with specialized expertise, can be compared to managing home improvement projects. There are many things you can try to repair using the Do-It-Yourself approach. If everything goes just right, you might save yourself some money, and hopefully, you’ve got time left over to relax. But what if everything goes wrong?

Read More »

Systems vs. Software

Finding an out-of-the-box software to resolve gaps in your current cyber security state appears easy. The hard part is ensuring the systems and people are in place to do the work.

Read More »

Choosing the Right MSP

To understand how your Managed Services Provider (MSP) stacks up from a security standpoint, here are some levels, observations, and questions to identify what you may currently have.

Read More »

DIY Security: Know When to Call in Experts

Deciding between keeping IT security tasks in-house or relying on a partner with specialized expertise, can be compared to managing home improvement projects. There are many things you can try to repair using the Do-It-Yourself approach. If everything goes just right, you might save yourself some money, and hopefully, you’ve got time left over to relax. But what if everything goes wrong?

Read More »