SWC Best Practices: From a Security Perspective, What is the Worst Case Scenario?
Every day we are seeing a rise in the number of security events with an estimated 117,339 daily attacks, it’s scary to think that your organization or the organizations you conduct business with might be vulnerable. However, this number is a low estimate as most organizations are unaware that they have been attacked or fail to report an security breach. Watch my best practices video to learn more about today’s security threats, the worst case scenarios and what your organization can do to keep your data safe.
In terms of worst case scenarios, we have seen a lot lately. Security is a serious matter and a lot of large corporations such as Target, Jewel-Osco, Home Depot and now JPMorgan have been the targets of security breaches and data hacks. In my opinion, there are two worst case scenarios when it comes to security. One is the Target situation, where their entire database of credit card numbers was leaked online. These credit card numbers weren’t encrypted, they were decrypted – or captured before encryption. That’s about as bad as it gets. The CEO lost his job, the CIO lost his job and a lot of shareholder’s lost value in the company. Once there’s a loss of confidence in the business, it’s hard to gain that back and Target is still fully feeling the effects of that.
The second worst case security scenario is CryptoLocker. CryptoLocker is ransomware that infects an organization via an email attachment. We’ve had a lot of customers that are concerned about CryptoLocker and we’ve also seen a lot in the news about companies getting hit with CryptoLocker. CryptoLocker is one of the worst case scenarios in my opinion, because it infects a user’s computer and then searches for file shares that the users has access. The malware then CryptoLocks or encrypts all of the organization’s files the user has access to. That could potentially be devastating for a corporation.
Typically the hackers then hold the file shares hostage and say that once you pay a certain amount they will provide you with the key to un-encrypt them. We advise our clients not to pay this ransom, the hackers will just keep furthering the situation if you pay. The key to preventing CryptoLocker and related security breaches is to have good backups and also prevention in place. SWC can work with you on this and provide you with that prevention. These security breaches do not have to happen and they do not have to be caught after the fact. They can be prevented beforehand. Don’t be the next target, contact us today for an information security assessment to see where your organization’s vulnerabilities lie and how we can help you build a solid security foundation.
There is a lot of uncertainty regarding today’s cyber security threats. Organizations need a solid security program that includes the right tools to keep their data safe. SWC can help your organization build a solid security foundation. Learn more, by joining us for our next complimentary Security 2.0: Don’t be the Next Target event.
Recommended Security Posts
If you enjoyed this security blog from Tommy, please check out a few of SWC’s related security posts:
What Industries Are Facing the Most Security Issues?
What Are Some Mobile Security Risks?
SWC Discusses Target Security Breach On Telemundo News Broadcast
How Can You Protect Your Organization From An IT Security Breach?
Security Awareness: Tips for Protecting Your Online Identity from Hackers
Heartbleed Is Much Worse Than We Thought
Tell Me About The Heartbleed Bug
The Fundamentals of Cyber Security
SWC Best Practices Posts
If you enjoyed watching this video as part of our SWC Best Practices blog series, take a moment to enjoy some of our past posts:
SWC Best Practices: Calculating the Value of IT at the C-Level
SWC Best Practices: Closing the Midmarket IT Talent Gap
SWC Best Practices: Does Outsourcing My Service Desk Make Sense?
SWC Best Practices: Enhanced Managed Services
SWC Best Practices: IT Industry Trends In Manufacturing & Distribution
Shellshock is the new Heartbleed bug. Contact us to learn more.