CYBER AWARENESS: 2021
Cyberattacks pose one
of the greatest risks to
company security
WHITEPAPER
CYBER AWARENESS: 2021 2
Executive
Summary
Stopping cyber-attacks is now
one of the greatest priorities for
companies across the world.
As work increasingly moves online, hackers have
fine-tuned their skills to steal sensitive private and
personal data from organizations and generate a
handsome profit for themselves.
The problem grew in 2020 after the start of the
COVID-19 pandemic. Most companies were
forced to move their operations online, a trend
expected to continue even after the pandemic
subsides. Employees moved away from their
secure company networks onto their less secure
residential networks, creating an attractive — and
lucrative — opportunity for hackers. At current
projections, cyberattacks are expected to
cost companies across the world a total of $6
trillion in 2021.¹
“
”
Cyberattacks are expected
to cost companies across
the world a total of $6
trillion in 2021
CYBER AWARENESS: 2021 3
Companies have consequently become more
aware of the need for robust cybersecurity
strategies, but much work remains to be done.
Many organizations report that their cybersecurity
teams are understaffed, and many of their
positions are filled by inexperienced individuals.
So how can executive teams better protect their
operations? Dealing with a complex problem like
cyberattacks requires a comprehensive solution.
Companies need to ensure their data is confined
to only those that need access to it, and they
need to ensure their employees are educated on
best practices to enable better security. Software
needs to be constantly updated to ensure
protection from the latest threats. In the event
of a breach, designing an appropriate business
continuity plan will help enable companies to
overcome and thrive even if disaster strikes.
“
”
Companies need to ensure
their data is confined to
only those that need access
to it, and they need to
ensure their employees are
educated on best practices
to enable better security.
CYBER AWARENESS: 2021 4
Growing cybersecurity risk
The enormous growth of online communications
and data storage in recent years has created
a treasure trove for hackers, and they have
used the opportunity to fine-tune their hacking
capabilities and become more adept at stealing
organizations’ data.
The problem exploded in 2020 during the
pandemic, when virtually all work, social and
private activity moved online. This concentrated
all company activity into online channels, exposing
many organizations to attack. The problem
was made significantly worse by the fact that
most employees had moved away from offices
containing more secure networks to their homes,
where residential networks were less equipped to
withstand sophisticated cyberattacks.
The result was predictable. One study found that
large-scale data breaches jumped 273% in the first
quarter of 2020 alone.²
“
”
Most employees had moved
away from offices containing
more secure networks to their
homes, where residential networks
were less equipped to withstand
sophisticated cyberattacks.
CYBER AWARENESS: 2021 5
62%
70%
Challenges facing companies
Despite the growing prevalence of cybersecurity
attacks, many companies are still severely under-
equipped to deal with them, lacking many of the
basic requirements needed to defend themselves.
One study found that 62% of companies reported
that their cybersecurity teams were either
“somewhat” or “significantly” understaffed.³
Shockingly, the same study found that 70% of
organizations reported that less than half of their
cybersecurity staff were well-qualified, a problem
made even worse by what respondents reported to
be a long and cumbersome hiring process.
of companies
reported that their
cybersecurity teams
were either “somewhat”
or “significantly”
understaffed
of organizations reported
that less than half of their
cybersecurity staff were
well-qualified
CYBER AWARENESS: 2021 6
Organizations need to act fast to overcome
these challenges. The technology companies
use is quickly evolving, and hackers are quickly
adapting to exploit vulnerabilities. This is especially
the case in the cloud computing space. Cloud
computing is becoming one of the primary forms
of data storage and computing power used by
organizations, making this one of the fastest
growing targets for hackers.
There were more than 7.5 million external attacks
on cloud accounts in the second quarter of 2020
alone.4 The total number of attacks in the first
part of the year surged by 250% compared to
2019.5 As companies continue to develop and
rely on more advanced technologies, they must
equip their cybersecurity teams with the personnel
and resources they need to ensure equally skilled
hackers cannot gain access to them.
“
”
There were more than
7.5 million external attacks on
cloud accounts in the second
quarter of 2020 alone. The
total number of attacks in the
first part of the year surged by
250% compared to 2019.
CYBER AWARENESS: 2021 7
Ransomware
One of the most common types
of cybersecurity attacks is
ransomware, and the threat
is growing.
According to VMware, ransomware attacks
increased 150% in 2020.6 This spike was
undoubtedly exacerbated by the COVID-19
pandemic, but ransomware attacks have been
steadily increasing for several years, so this trend
is likely to continue. Early figures suggest that the
frequency of ransomware attacks has continued to
climb in 2021.7
Ransomware attacks occur when hackers gain
access to a company’s software and encrypt
sensitive data information and other files. They
then demand a ransom from the company and
network administrators, which some executives,
unsurprisingly, feel obliged to pay. The average cost
of a ransomware attack was more than $84,000
in 2019. Similar to the total number attacks, total
dollar figures paid out to ransomware hackers have
skyrocketed since the start of 2020.
Companies do not just lose the amount paid
in ransom when an attack occurs. Losses also
include the amount of lost revenue while data
files are encrypted, costs associated with fixing
and replacing damaged software or hardware,
and any costs required to repair the brand image
in the eyes of customers. There are additional
costs associated with notification provisions —
the process by which companies must notify all
individuals of a security breach. Some companies
may even be expected to pay fines if their security
infrastructure was non-compliant.
The problem is getting worse. More hackers are
beginning to store copies of the data they steal
and threaten to release it publicly. For company
executives, this is a practically unthinkable
prospect, and hackers know it. This enables them
to demand still higher ransom sums.
Fortunately, most ransomware attacks happen due
to phishing, accounting for around 67% of the total
in 2020.8 That means companies can narrow their
focus when building their security plans against
ransomware attacks, potentially making them
more successful at stopping ransomware in the
long term.
67%
Fortunately, most
ransomware attacks
happen due to phishing,
accounting for around
67% of the total in 2020.
CYBER AWARENESS: 2021 8
Phishing occurs when hackers gain access to
private data information by digitally disguising
themselves as clients, senior executives, or other
trusted individuals or entities and sending emails
to unsuspecting employees requesting sensitive
information. Information commonly stolen through
phishing attacks include passwords, social security
numbers and other personal information, all of
which attackers can use to access email, bank and
other private accounts.
Phishing is a serious threat to companies, and it
remains one of the most common forms of data
breaches. In 2019 alone, 88% of organizations
reported experiencing a phishing attack at least
once.9 As mentioned, it can also lead to other
forms of attack, making it an especially urgent and
important challenge to overcome.
Phishing
Like ransomware, the number of phishing attacks
saw an enormous spike in 2020. According to data
from the FBI, the total number of attacks jumped
from 114,702 in 2019 to 241,324 the following
year, making it the most common type of
cyberattack in 2020.¹0
88%
of organizations
reported experiencing
a phishing attack at
least once.
CYBER AWARENESS: 2021 9
What can companies do?
The best way to handle a threat is to prevent it from
ever taking place.In addition to hiring and training
a skilled, experienced and capable cybersecurity
team, companies can also take the following
proactive steps to keep their data safe:
Prevent human error
Human error is one of the most common causes
of cybersecurity breaches. Limit how many
employees have access to company data so that,
in the event an employee causes a data breach,
the information hackers can steal will be restricted
to that individual. It is also important to ensure
outgoing employees lose all access to company
data as soon as they leave the organization.
Invest in employee education
It is important that employees are properly trained
on best practices to prevent common attacks
from occurring. Using company computers on
personal or residential networks can pose a risk,
so employees should understand how to use their
computers at home safely and securely. This also
applies to mobile phones and personal devices.
They may not be as well secured as company
networks, so conducting business over these
networks can increase the chances of a breach.
CYBER AWARENESS: 2021 10
Create business continuity
and response procedures
On the macro level, it is important to develop a
comprehensive business continuity plan to help
restore any lost data in the event of a breach.
Ensure that every step is minutely detailed and that
key individuals are identified and their roles clearly
outlined. A solid business continuity plan should
also ensure that all data is backed up regularly
and copies are stored in a secure, dedicated
offsite location.
Update and patch
security software
Lastly, companies need to invest in high-quality
cybersecurity software to guarantee they have
strong protection against the latest threats. Part
of this process is ensuring software updates
are properly scheduled and applied as soon as
possible to maximize the efficacy of their security
infrastructure. If they identify a vulnerability in any
part of their security infrastructure, they should
ensure that it is patched as soon as possible.
Cybersecurity threats are on the rise, and this trend
is likely to continue as more companies shift to a
totally virtual or hybrid work environment. Those
that are unable (or unwilling) to keep up with the
threat will unnecessarily expose themselves to risk,
theft and loss, severely threatening their bottom
line. The more prudent organizations, however, will
ensure that their sensitive information stays safe,
helping them stay agile in the face of threats and
paving the way for future growth.
900 Route 9 North, Suite 503
Woodbridge, NJ 07095-1003
800.446.7647
www.nipgroup.com
1.	 https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
2.	 https://www.cnbc.com/2020/07/29/cybercrime-ramps-up-amid-coronavirus-chaos-costing-companies-billions.html
3.	 https://www.isaca.org/go/state-of-cybersecurity-2020
4.	 https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-nov-2020.pdf
5.	 https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/
6.	 https://www.cnbc.com/2020/07/29/cybercrime-ramps-up-amid-coronavirus-chaos-costing-companies-billions.html
7.	 https://hbr.org/2021/05/ransomware-attacks-are-spiking-is-your-company-prepared
8.	 https://www.safetydetectives.com/blog/ransomware-statistics/#:~:text=Ransomware%20isn%27t%20going%20away,will%20continue%20to%20
be%20targeted.
9.	 https://www.proofpoint.com/sites/default/files/gtd-pfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf
10.	 https://www.tessian.com/blog/phishing-statistics-2020/#:~:text=According%20to%20the%20FBI%2C%20phishing,in%202020%20compared%20
to%202016

More Related Content

PDF
idg_secops-solutions
PDF
Cybersecurity Predictions For 2022.pdf
PPTX
The Five Biggest Cyber Security Trends In 2022
PDF
The top cybersecurity challenges post-lockdow
PPTX
Top cybersecurity trends to adapt in 2022
PDF
True Cost of Ransomware to Your Business
PDF
2021 Cybersecurity Recap: How Did We Fare Last Year?
PDF
CYBER-THREAT-LANDSCAPE-2021.pdf
idg_secops-solutions
Cybersecurity Predictions For 2022.pdf
The Five Biggest Cyber Security Trends In 2022
The top cybersecurity challenges post-lockdow
Top cybersecurity trends to adapt in 2022
True Cost of Ransomware to Your Business
2021 Cybersecurity Recap: How Did We Fare Last Year?
CYBER-THREAT-LANDSCAPE-2021.pdf

Similar to White Paper Example - Brafton for NIP Group.pdf (20)

PDF
5 Security Trends to Watch in 2020
PDF
Why is cyber security a disruption in the digital economy
PDF
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
PPTX
Why Cybersecurity is a Data Problem
PPTX
7 Cybersecurity Statistics You Need to Know in 2023.pptx
PDF
Cybersecurity in BFSI - Top Threats & Importance
PDF
Cyber Security Vulnerabilities
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PDF
5 network-security-threats
DOCX
8Network Security April 2020FEATUREAre your IT staf.docx
DOCX
8Network Security April 2020FEATUREAre your IT staf.docx
PDF
Cybersecurity in the Cloud: Safer Than You Think
PDF
2024 Cyber Threats: What's New and What You Should Keep an Eye On!
PDF
BIZGrowth Strategies - Cybersecurity Special Edition
DOC
Cybersecurity Threats to Watch Out For in 2025.doc
DOCX
What you need to know about cyber security
PDF
Top Cybersecurity Trends of 2021
PDF
GramaxCybersec_Cybersecurity Trends 2024.pdf
PDF
What are top 7 cyber security trends for 2020
PDF
Cybersecurity Made Simple: How to Protect Your Business in 2025
5 Security Trends to Watch in 2020
Why is cyber security a disruption in the digital economy
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Why Cybersecurity is a Data Problem
7 Cybersecurity Statistics You Need to Know in 2023.pptx
Cybersecurity in BFSI - Top Threats & Importance
Cyber Security Vulnerabilities
Five Network Security Threats And How To Protect Your Business Wp101112
5 network-security-threats
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
Cybersecurity in the Cloud: Safer Than You Think
2024 Cyber Threats: What's New and What You Should Keep an Eye On!
BIZGrowth Strategies - Cybersecurity Special Edition
Cybersecurity Threats to Watch Out For in 2025.doc
What you need to know about cyber security
Top Cybersecurity Trends of 2021
GramaxCybersec_Cybersecurity Trends 2024.pdf
What are top 7 cyber security trends for 2020
Cybersecurity Made Simple: How to Protect Your Business in 2025
Ad

More from Brafton (20)

PDF
Epson_eBook.pdf
PDF
MoEngage_eBook.pdf
PPTX
E-A-T Study Charts Brafton.pptx
PDF
White Paper Example - Brafton for Arrow.pdf
PDF
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdf
PDF
eBook example - Attanium - Case study collection.pdf
PDF
Content + Marketing Automation = Results
PDF
Why content marketing matters Brafton
PDF
10 Brands that prove B2Bs have a place on Instagram
PDF
Brafton Chicago rings in holidays, new year at House of Blues
PDF
15 Content marketing quotes to ring in 2015
PDF
Brafton's Ugly Holiday Sweater Competition in Chicago
PDF
Brafton’s Annual Company Holiday Party in Boston
PDF
What to wear to look your best in marketing videos
PDF
30 content marketing stats to be thankful for in 2014
PDF
Content & Costumes.... Halloween Brafton style
PDF
Scary social: 13 Cringeworthy brand fails of 2014
PPTX
B2B Social marketing doesn't have to be boring: 15 campaigns that nail it
PDF
Brafton's Summer Travels 2014
PDF
April 2014 uhc wellness newsletter1 stress mgmt
Epson_eBook.pdf
MoEngage_eBook.pdf
E-A-T Study Charts Brafton.pptx
White Paper Example - Brafton for Arrow.pdf
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdf
eBook example - Attanium - Case study collection.pdf
Content + Marketing Automation = Results
Why content marketing matters Brafton
10 Brands that prove B2Bs have a place on Instagram
Brafton Chicago rings in holidays, new year at House of Blues
15 Content marketing quotes to ring in 2015
Brafton's Ugly Holiday Sweater Competition in Chicago
Brafton’s Annual Company Holiday Party in Boston
What to wear to look your best in marketing videos
30 content marketing stats to be thankful for in 2014
Content & Costumes.... Halloween Brafton style
Scary social: 13 Cringeworthy brand fails of 2014
B2B Social marketing doesn't have to be boring: 15 campaigns that nail it
Brafton's Summer Travels 2014
April 2014 uhc wellness newsletter1 stress mgmt
Ad

Recently uploaded (20)

PPTX
Digital-Marketing-Strategy-Trends-and-Best-Practices-for-2025 PPT3.pptx
PPTX
Top Digital Marketing Companies in Mumbai
PPTX
Best Web Development Company in Lucknow.pptx
PDF
Plastic Products-price poster holder pricing board-Loripos.pdf
PDF
2025_Untamed_HuntingIndustryInsights.pdf
DOCX
IREV Platform: Future of Affiliate Marketing
PDF
Generation Alpha Report 2025 x DKC Analytics.pdf
PDF
White Paper - Building the AI-ready content organization
PDF
6 AI Marketing Myths That Are Slowing You Down & Draining Your Budgets
PDF
Snapshot of Consumer Behaviors of July 2025-EOLiSurvey (EN).pdf
PPTX
Unit 2 - Architects Act, COA n competitions.pptx
PDF
digital marketing courses online with od
PDF
Expert Social Media Marketing Services for Maximum Engagement
PPTX
1 percent Clicks, percent Traffic Loss-Your SEO Stack Isn’t Built for AI
PPTX
Segmentation_EM[1]_Powerpoint prese.pptx
PPTX
Automate your marketing workflow with AI - Rysa AI
PPTX
Best Mobile App Development Company in Lucknow
PDF
Digital Marketing Training in Hyderabad
PDF
Top-Rated Marketplaces to Buy Verified Cash App Accounts Safely.pdf
PDF
Salmanubnu Zakariya P – Digital Marketer & Frontend Developer Portfolio
Digital-Marketing-Strategy-Trends-and-Best-Practices-for-2025 PPT3.pptx
Top Digital Marketing Companies in Mumbai
Best Web Development Company in Lucknow.pptx
Plastic Products-price poster holder pricing board-Loripos.pdf
2025_Untamed_HuntingIndustryInsights.pdf
IREV Platform: Future of Affiliate Marketing
Generation Alpha Report 2025 x DKC Analytics.pdf
White Paper - Building the AI-ready content organization
6 AI Marketing Myths That Are Slowing You Down & Draining Your Budgets
Snapshot of Consumer Behaviors of July 2025-EOLiSurvey (EN).pdf
Unit 2 - Architects Act, COA n competitions.pptx
digital marketing courses online with od
Expert Social Media Marketing Services for Maximum Engagement
1 percent Clicks, percent Traffic Loss-Your SEO Stack Isn’t Built for AI
Segmentation_EM[1]_Powerpoint prese.pptx
Automate your marketing workflow with AI - Rysa AI
Best Mobile App Development Company in Lucknow
Digital Marketing Training in Hyderabad
Top-Rated Marketplaces to Buy Verified Cash App Accounts Safely.pdf
Salmanubnu Zakariya P – Digital Marketer & Frontend Developer Portfolio

White Paper Example - Brafton for NIP Group.pdf

  • 1. CYBER AWARENESS: 2021 Cyberattacks pose one of the greatest risks to company security WHITEPAPER
  • 2. CYBER AWARENESS: 2021 2 Executive Summary Stopping cyber-attacks is now one of the greatest priorities for companies across the world. As work increasingly moves online, hackers have fine-tuned their skills to steal sensitive private and personal data from organizations and generate a handsome profit for themselves. The problem grew in 2020 after the start of the COVID-19 pandemic. Most companies were forced to move their operations online, a trend expected to continue even after the pandemic subsides. Employees moved away from their secure company networks onto their less secure residential networks, creating an attractive — and lucrative — opportunity for hackers. At current projections, cyberattacks are expected to cost companies across the world a total of $6 trillion in 2021.¹ “ ” Cyberattacks are expected to cost companies across the world a total of $6 trillion in 2021
  • 3. CYBER AWARENESS: 2021 3 Companies have consequently become more aware of the need for robust cybersecurity strategies, but much work remains to be done. Many organizations report that their cybersecurity teams are understaffed, and many of their positions are filled by inexperienced individuals. So how can executive teams better protect their operations? Dealing with a complex problem like cyberattacks requires a comprehensive solution. Companies need to ensure their data is confined to only those that need access to it, and they need to ensure their employees are educated on best practices to enable better security. Software needs to be constantly updated to ensure protection from the latest threats. In the event of a breach, designing an appropriate business continuity plan will help enable companies to overcome and thrive even if disaster strikes. “ ” Companies need to ensure their data is confined to only those that need access to it, and they need to ensure their employees are educated on best practices to enable better security.
  • 4. CYBER AWARENESS: 2021 4 Growing cybersecurity risk The enormous growth of online communications and data storage in recent years has created a treasure trove for hackers, and they have used the opportunity to fine-tune their hacking capabilities and become more adept at stealing organizations’ data. The problem exploded in 2020 during the pandemic, when virtually all work, social and private activity moved online. This concentrated all company activity into online channels, exposing many organizations to attack. The problem was made significantly worse by the fact that most employees had moved away from offices containing more secure networks to their homes, where residential networks were less equipped to withstand sophisticated cyberattacks. The result was predictable. One study found that large-scale data breaches jumped 273% in the first quarter of 2020 alone.² “ ” Most employees had moved away from offices containing more secure networks to their homes, where residential networks were less equipped to withstand sophisticated cyberattacks.
  • 5. CYBER AWARENESS: 2021 5 62% 70% Challenges facing companies Despite the growing prevalence of cybersecurity attacks, many companies are still severely under- equipped to deal with them, lacking many of the basic requirements needed to defend themselves. One study found that 62% of companies reported that their cybersecurity teams were either “somewhat” or “significantly” understaffed.³ Shockingly, the same study found that 70% of organizations reported that less than half of their cybersecurity staff were well-qualified, a problem made even worse by what respondents reported to be a long and cumbersome hiring process. of companies reported that their cybersecurity teams were either “somewhat” or “significantly” understaffed of organizations reported that less than half of their cybersecurity staff were well-qualified
  • 6. CYBER AWARENESS: 2021 6 Organizations need to act fast to overcome these challenges. The technology companies use is quickly evolving, and hackers are quickly adapting to exploit vulnerabilities. This is especially the case in the cloud computing space. Cloud computing is becoming one of the primary forms of data storage and computing power used by organizations, making this one of the fastest growing targets for hackers. There were more than 7.5 million external attacks on cloud accounts in the second quarter of 2020 alone.4 The total number of attacks in the first part of the year surged by 250% compared to 2019.5 As companies continue to develop and rely on more advanced technologies, they must equip their cybersecurity teams with the personnel and resources they need to ensure equally skilled hackers cannot gain access to them. “ ” There were more than 7.5 million external attacks on cloud accounts in the second quarter of 2020 alone. The total number of attacks in the first part of the year surged by 250% compared to 2019.
  • 7. CYBER AWARENESS: 2021 7 Ransomware One of the most common types of cybersecurity attacks is ransomware, and the threat is growing. According to VMware, ransomware attacks increased 150% in 2020.6 This spike was undoubtedly exacerbated by the COVID-19 pandemic, but ransomware attacks have been steadily increasing for several years, so this trend is likely to continue. Early figures suggest that the frequency of ransomware attacks has continued to climb in 2021.7 Ransomware attacks occur when hackers gain access to a company’s software and encrypt sensitive data information and other files. They then demand a ransom from the company and network administrators, which some executives, unsurprisingly, feel obliged to pay. The average cost of a ransomware attack was more than $84,000 in 2019. Similar to the total number attacks, total dollar figures paid out to ransomware hackers have skyrocketed since the start of 2020. Companies do not just lose the amount paid in ransom when an attack occurs. Losses also include the amount of lost revenue while data files are encrypted, costs associated with fixing and replacing damaged software or hardware, and any costs required to repair the brand image in the eyes of customers. There are additional costs associated with notification provisions — the process by which companies must notify all individuals of a security breach. Some companies may even be expected to pay fines if their security infrastructure was non-compliant. The problem is getting worse. More hackers are beginning to store copies of the data they steal and threaten to release it publicly. For company executives, this is a practically unthinkable prospect, and hackers know it. This enables them to demand still higher ransom sums. Fortunately, most ransomware attacks happen due to phishing, accounting for around 67% of the total in 2020.8 That means companies can narrow their focus when building their security plans against ransomware attacks, potentially making them more successful at stopping ransomware in the long term. 67% Fortunately, most ransomware attacks happen due to phishing, accounting for around 67% of the total in 2020.
  • 8. CYBER AWARENESS: 2021 8 Phishing occurs when hackers gain access to private data information by digitally disguising themselves as clients, senior executives, or other trusted individuals or entities and sending emails to unsuspecting employees requesting sensitive information. Information commonly stolen through phishing attacks include passwords, social security numbers and other personal information, all of which attackers can use to access email, bank and other private accounts. Phishing is a serious threat to companies, and it remains one of the most common forms of data breaches. In 2019 alone, 88% of organizations reported experiencing a phishing attack at least once.9 As mentioned, it can also lead to other forms of attack, making it an especially urgent and important challenge to overcome. Phishing Like ransomware, the number of phishing attacks saw an enormous spike in 2020. According to data from the FBI, the total number of attacks jumped from 114,702 in 2019 to 241,324 the following year, making it the most common type of cyberattack in 2020.¹0 88% of organizations reported experiencing a phishing attack at least once.
  • 9. CYBER AWARENESS: 2021 9 What can companies do? The best way to handle a threat is to prevent it from ever taking place.In addition to hiring and training a skilled, experienced and capable cybersecurity team, companies can also take the following proactive steps to keep their data safe: Prevent human error Human error is one of the most common causes of cybersecurity breaches. Limit how many employees have access to company data so that, in the event an employee causes a data breach, the information hackers can steal will be restricted to that individual. It is also important to ensure outgoing employees lose all access to company data as soon as they leave the organization. Invest in employee education It is important that employees are properly trained on best practices to prevent common attacks from occurring. Using company computers on personal or residential networks can pose a risk, so employees should understand how to use their computers at home safely and securely. This also applies to mobile phones and personal devices. They may not be as well secured as company networks, so conducting business over these networks can increase the chances of a breach.
  • 10. CYBER AWARENESS: 2021 10 Create business continuity and response procedures On the macro level, it is important to develop a comprehensive business continuity plan to help restore any lost data in the event of a breach. Ensure that every step is minutely detailed and that key individuals are identified and their roles clearly outlined. A solid business continuity plan should also ensure that all data is backed up regularly and copies are stored in a secure, dedicated offsite location. Update and patch security software Lastly, companies need to invest in high-quality cybersecurity software to guarantee they have strong protection against the latest threats. Part of this process is ensuring software updates are properly scheduled and applied as soon as possible to maximize the efficacy of their security infrastructure. If they identify a vulnerability in any part of their security infrastructure, they should ensure that it is patched as soon as possible. Cybersecurity threats are on the rise, and this trend is likely to continue as more companies shift to a totally virtual or hybrid work environment. Those that are unable (or unwilling) to keep up with the threat will unnecessarily expose themselves to risk, theft and loss, severely threatening their bottom line. The more prudent organizations, however, will ensure that their sensitive information stays safe, helping them stay agile in the face of threats and paving the way for future growth.
  • 11. 900 Route 9 North, Suite 503 Woodbridge, NJ 07095-1003 800.446.7647 www.nipgroup.com 1. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ 2. https://www.cnbc.com/2020/07/29/cybercrime-ramps-up-amid-coronavirus-chaos-costing-companies-billions.html 3. https://www.isaca.org/go/state-of-cybersecurity-2020 4. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-nov-2020.pdf 5. https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/ 6. https://www.cnbc.com/2020/07/29/cybercrime-ramps-up-amid-coronavirus-chaos-costing-companies-billions.html 7. https://hbr.org/2021/05/ransomware-attacks-are-spiking-is-your-company-prepared 8. https://www.safetydetectives.com/blog/ransomware-statistics/#:~:text=Ransomware%20isn%27t%20going%20away,will%20continue%20to%20 be%20targeted. 9. https://www.proofpoint.com/sites/default/files/gtd-pfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf 10. https://www.tessian.com/blog/phishing-statistics-2020/#:~:text=According%20to%20the%20FBI%2C%20phishing,in%202020%20compared%20 to%202016