Protect your systems: five cyber-attack realities to guide you
![]() You know you’re a target. You’ve been told multiple times by various sources that cyber security is necessary to protect your company from attacks.So, you decide to be proactive in your security approach and make risk-based decisions. And yet, a Google search on the sub-ject uncovers hundreds of checklists, guidelines and products – all of which claim to solve a different cyber security concern or problem. The risks seem endless, and the solutions impossible to wade through. It might seem a daunting task, but here are five cyber-attack realities that provide a guide to your next step in managing this risk.There is no turnkey cyber security solution There is no one off-the-shelf solution that will protect all of your systems from differ-ent types of cyber attacks. Cyber security requires an understanding of what your company needs to protect, investing the time to protect it properly and maintaining security as an ongoing process. The key to success is to balance the impact and cost of security with the actual risk posed. Kroll calls this balancing process ‘incident risk management’. Start off with an assessment of the risks in your existing systems and focus your security accordingly. Secure your systems from both outside and inside attacks Kroll has worked with numerous companies that invested in prod-ucts to block continuous attacks. What we have noted, however, is an overall lack of investment in internal monitoring of systems, or what we call ‘end point threat monitoring’. This monitoring involves using software to record user activities within a network and flag any activity that may be indicative of an attack. Failure to have end point threat monitoring in place can expose you to: Data loss is a symptom of a bigger problem – investigate The attacker often stays in your system after the attack Cyber fatigue is real, but not an excuse for inaction |
Email: jfairtlough@kroll.com
Website: www.kroll.com

