{"id":82435,"date":"2022-02-01T10:45:00","date_gmt":"2022-02-01T15:45:00","guid":{"rendered":"https:\/\/isarta.com\/news\/?p=82435"},"modified":"2022-02-03T06:31:33","modified_gmt":"2022-02-03T11:31:33","slug":"cybersecurity-if-you-could-only-do-these-3-things","status":"publish","type":"post","link":"https:\/\/isarta.com\/news\/cybersecurity-if-you-could-only-do-these-3-things\/","title":{"rendered":"Cybersecurity: If you could only do these 3 things&#8230;"},"content":{"rendered":"\n<p><br><strong>The pandemic has forced businesses to take a digital turn (by adopting telecommuting and online commerce) that now makes them highly vulnerable to&nbsp;cyberattacks. Here&#8217;s how to protect yourself.<br><\/strong><br>Logically, businesses should urgently upgrade their IT network security. Yet, too many executives give up before they even try, no doubt overwhelmed by what seems like an insurmountable task.<\/p>\n\n\n\n<p>In a February 2021&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/content.cfib-fcei.ca\/sites\/default\/files\/2021-02\/RapportFCEI-cyberfraude-F.pdf\" target=\"_blank\">report<\/a>&nbsp;released by the Canadian Federation of Independent Business, 6 in 10 executives agreed with the following statement:<\/p>\n\n\n\n<p>I don&#8217;t have the time, knowledge or resources to properly protect my business from cyberattacks.&#8221;<\/p>\n\n\n\n<p>Yet, it turns out that the &#8220;minimum&#8221; to protect a business is not unreasonable or extravagant. Cybersecurity consultant Jean-Philippe Racine, president of CyberSwat Group, urges businesses to consider &#8220;three essentials&#8221; that can greatly reduce the risk of suffering a cyberattack or limit the damage if one does occur:<\/p>\n\n\n\n<ul><li>Two-step strong authentication;<\/li><li>Employee training;<\/li><li>The use of &#8220;immutable&#8221; backups.<\/li><\/ul>\n\n\n\n<p>We explain these measures with the help of Emeline Manson, fraud prevention and cybersecurity trainer and founder&nbsp;of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/emdeveloppement.ca\/\" target=\"_blank\">EM D\u00e9veloppement<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2021\/11\/SAM_5907-683x1024.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>1. Activating two-step authentication<br><\/strong><br>Two-factor authentication refers to the sequence where an application asks us to enter a second authentication code after we enter our username and password. This second code is generated by the application itself; it is then sent to us via text message, email or an authentication code management application.<\/p>\n\n\n\n<p>This counters almost all automated attacks that look for user\/password combinations,&#8221; says Jean-Philippe Racine.<\/p>\n\n\n\n<p>To add a layer of security to the process, Emeline Manson advises receiving this famous code on an authentication code management application rather than by text or email.<\/p>\n\n\n\n<p><strong>2.&nbsp;<\/strong><strong>Educating<\/strong><strong>&nbsp;employees<br><\/strong><br>According to&nbsp;<a href=\"https:\/\/www.verizon.com\/business\/fr-fr\/resources\/reports\/dbir\/\" rel=\"noreferrer noopener\" target=\"_blank\">Verizon&#8217;s 2021 Data Compromise Investigation Report<\/a>, 85%&nbsp;of computer breaches today are still attributable to human error, and 35% of breaches result from phishing (which is the technique where an employee is prompted to click on a link or attachment that leads to the release of malware).<\/p>\n\n\n\n<p>Unsolicited links and attachments are the biggest gateway into a company, warns Emeline Manson. And phishing can come from anywhere: a text message, a message on a social network or an email.<strong>&#8220;<\/strong><\/p>\n\n\n\n<p>In light of these statistics, it&#8217;s easy to see how important it is to make employees aware of these types of threats. This is the mandate of Emeline Manson, who&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/emdeveloppement.ca\/\" target=\"_blank\">offers online training<\/a>&nbsp;and coaching to businesses and solopreneurs who want to adopt best practices in cybersecurity.<br>Manson also points out that cyber hackers are becoming increasingly adept at impersonating a supervisor via email to order an employee to make an illegal transfer of funds, known as &#8220;president fraud&#8221;. This requires employees to be extra vigilant for this type of fraud and threat.<\/p>\n\n\n\n<p><strong>3. Use an &#8220;immutable&#8221; storage solution<br><\/strong><br>An &#8220;immutable&#8221; storage solution is an application that provides a backup that cannot be deleted by any user. Using this type of backup can be critical to recovery when a company has been infiltrated by ransomware and all of its data is encrypted.<\/p>\n\n\n\n<p>In a ransomware attack, hackers not only take the data hostage, but they will also try to encrypt the backups,&#8221; explains Jean-Philippe Racine. If you use immutable backups, you speed up the recovery of systems when you are the victim of a computer attack.&#8221;<\/p>\n\n\n\n<p>Of course, ensuring a company&#8217;s cybersecurity can go much further than these three &#8220;essentials.&#8221; Especially if your business has sensitive data. However, cybersecurity should be viewed as a continuous improvement project. A company takes one step at a time toward a greater level of compliance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pandemic has forced businesses to take a digital turn (by adopting telecommuting and online commerce) that now makes them highly vulnerable to cyberattacks. Here&#8217;s how to protect yourself.<\/p>\n","protected":false},"author":88,"featured_media":82441,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"tags":[11,158],"_links":{"self":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts\/82435"}],"collection":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/users\/88"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/comments?post=82435"}],"version-history":[{"count":2,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts\/82435\/revisions"}],"predecessor-version":[{"id":82450,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts\/82435\/revisions\/82450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/media\/82441"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/media?parent=82435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/categories?post=82435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/tags?post=82435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}