European Cyber Security Month: Is your data as secure as you think?
As we become more dependent on the online digital world, for our work, social life, or leisure time, our cyber security has never been more vital; especially considering how widely adopted remote working now is. Previously, many threats have been aimed at accessing our bank accounts to steal money, however, as times change the increased value of information and more specifically your data, has accounted for a rise in ransomware and database attacks.
October is European Cyber Security Month, with the aim of ECSM is to promote cyber security and improve society’s awareness of threats. ECSM have over 370 events being held across 34 countries. Similar events are held in other parts of the world, i.e. America has National Cyber Security Awareness Month and Canada has Cyber Security Awareness Month.
Facts & Stats
Looking at the malicious attack category a bit closer, we can see that dodgy cloud configurations and weak passwords can take primary blame.
Following are some facts about cyber security and data breaching that you might not know...
On average, only 5% of companies’ folders are properly protected. [Varonis]
95% of cybersecurity breaches are caused by human error. [Cybint]
Data breaches exposed 36 billion records in the first half of 2020. [RiskBased]
68% of business leaders feel their cybersecurity risks are increasing. [Accenture]
45% of breaches featured hacking, 17% involved malware and 22% involved phishing. [Verizon]
What you can do...
1. Back-Up and Encrypt
Backing up your data regularly is one of the best defences against cyber attacks such as ransomware. Back ups enable data to be restored on demand and, in best cases, will be stored on separate servers. All data should be encrypted in transit and at rest meaning that even if a cyber criminal gains access they will not be able to view the content.
2. Use Two-Factor authentication
Two-factor or multi-factor authentication is a service that adds additional layers of security to the standard password method of online identification. Typically, you'd enter a name and password. But, with two-factor, you would be prompted to enter one additional authentication method such as a Personal Identification Code, another password or even fingerprint. With multi-factor authentication, you would be prompted to enter more than two additional authentication methods after entering your username and password.
3. Limit access to your data
By limiting access to your data, you are also limiting the openings hackers have into your data environment. Restricting access is just one way to make sure your data isn't vulnerable to attackers. This can be done via IP restrictions that adds another layer to two factor authentication to ensure that only designated machines/locations have access.
What we can do for your data security...
Configur offers enterprise security for all of our plans. All data is encrypted in transit and at rest within siloed replicated databases per organisation and is hosted in secure UK data centres. Configur is GDPR Gold standard compliant and has Cyber Essentials and Cyber Essentials Plus certification. We also undergo regular penetration testing to ensure your data is safe.
Head over to www.configur.co.uk/demo to find out more about how we can help.
Digital Marketing Coordinator