Blog

Cyber Security Week 3 - It's Everyone's Job to Ensure Online Safety at Work

10/26/2018

Week 3 of National Cybersecurity Awareness Month (NCSAM) has just wrapped up, and we want to shine a spotlight on helping everyone at work — from the break room to the boardroom — understand the importance of online safety. When you are on the job – whether it’s at your corporate office, a satellite location, or onsite with a client ‒ your organization’s online safety and security are a responsibility that everyone shares. And, as the lines between our work and daily lives become increasingly blurred, it is more important than ever to be certain that smart cybersecurity carries over between the two.

The industry has some best practices for making sure employees and contingent workers know how to play an active role in helping keep the workplace and company data secure. Executives should recognizing that employees are the first line of defense in corporate security and, therefore, should cultivate a culture where security is top of mind and sets expectations for good security hygiene by helping employees know what actions to take.

Some examples include:

  1. Delivering more role-based information security training courses to the enterprise and providing annual Information Security Awareness training.
  2. Executing regular companywide information security awareness campaigns to engage employees and keep them connected to corporate information security and privacy policies, as well as the evolving security landscape.
  3. Enforcing compliance and managing change via targeted internal communications.

Keep in mind that all businesses need to take measures to help prevent attacks and have a set plan ready to go if one does occur. Across the board, NCSA recommends a top-down approach to creating a culture of cybersecurity in the workplace. The following steps ‒ developed by NIST ‒ will help tremendously as you formulate a plan to keep your business secure.

  • Identify: Conduct an inventory of our most valuable assets – the “crown jewels” of greatest importance to our business and of most value to criminals – such as employee, customer and payment data.
  • Protect: Assess what protective measures you need in place – such as keeping our software up to date or by following these tips – to defend the organization as much as possible against a cyber-incident.
  • Detect: Have systems set up that would alert you if an incident occurs, including the ability for employees to report problems.
  • Respond: Make and practice an incidence response plan to contain an attack and maintain business operations in the short term.
  • Recover: Know what to do to return to normal business operations after an incident or breach, including assessing any legal obligations.

Related Resources

BlogBlog

Direct Liquid Cooling Enables High-Performance Computing in Involta Data Centers

Enter go to Blog : Direct Liquid Cooling Enables High-Performance Computing in Involta Data Centers
BlogBlog

Involta and Becker’s Healthcare IT Webinar Preview

Enter go to Blog : Involta and Becker’s Healthcare IT Webinar Preview
BlogBlog

You Might Need Involta DRaaS+ If…

Enter go to Blog : You Might Need Involta DRaaS+ If…
BlogBlog

People Who Deliver: Spotlight Interview with Austin Doggett

Enter go to Blog : People Who Deliver: Spotlight Interview with Austin Doggett
BlogBlog

How to Choose the Right DRaaS+ Solution for Your Company

Enter go to Blog : How to Choose the Right DRaaS+ Solution for Your Company
BlogBlog

3 Proven Reasons Why DRaaS+ is a Worthy Business Investment

Enter go to Blog : 3 Proven Reasons Why DRaaS+ is a Worthy Business Investment

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience. By continuing to use our website, you agree to the Privacy Policy.