The summer provides the ideal time for a number of catch-up activities: you can watch those blockbuster films you missed all year, finally thumb through that pile of subscription magazines, and clean out the old dusty toolshed in the backyard.
The dog days are also a great time for companies to think about their cybersecurity.
An article for SecurityWeek suggests that the vacation period leaves firms open to vulnerabilities:
“With employees travelling, it’s important to address your security posture. Are your assets patched, encrypted and up to date with the latest protection updates as driven by your security posture? If not, can you make this a priority before those assets start traveling to unknown locations in employees’ luggage and carry-on bags?
Within the security organization specifically, have you planned for personnel shortages and coverage while employees take vacation? Do you have contact information for all critical members of the organization and their backups in case a significant incident is discovered? The threat actors in today’s environment recognize that organizations may not be as diligent about monitoring alerts over the summer, and they’ll take advantage of the potential opportunity for increased dwell time. Now is the time to plan and prepare; you may even want to conduct an incident response drill.
In addition to evaluating your organization’s overall security posture and your team’s readiness to handle staffing challenges, the summer gives individuals on your security team the chance to expand their roles and responsibilities. Are there projects that need additional resources? Processes that need to be improved or standardized? The summer is a fantastic time to do an overall evaluation and put in place new challenges and opportunities for security staff members to undertake in the second half of the year.
As you evaluate your security program, think about everything you can do to make progress toward your annual goals. How are you expanding the security visibility in your organization? Do you have access to the data sources you need to confidently detect and respond to threats in your organization? Do you have processes in place to efficiently handle incidents? How have these things changed over the course of the year so far? With half the year already behind you, it’s important to step back and evaluate the overall security posture.”
Evizone provides the ideal protection against theft and data breaches. No information transmitted through our secure communications software is stored on the devices involved. Instead, data resides on servers protected with military-grade encryption.
Take advantage of our FREE TRAIL and rest easy, margarita in hand, knowing that your company is utilizing the strongest commercially available communication tool on the market.
About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, email@example.com