10.20.20 | Cybersecurity | Blog Posts
Cybersecurity Awareness Month 2020: Resources and Tips
October is Cybersecurity Awareness Month. Each week, we’ve been using social media to share articles, checklists, tips, and other resources to help reduce the cyber risks for your employees and organization.print
Here’s a look at what we’ve shared. Follow us on LinkedIn, Twitter, Facebook, and Instagram for ongoing tips and insight.
If You Connect It, Protect It
- Developing a Strategy for IT Asset Management Success – IT asset management can seem like a mountainous task, but strategic planning will make it manageable and save you headaches and sleepless nights. This article provides steps to help you get started.
- Top Cybersecurity Myths: We Have a Great IT Department – IT and information security are two very different functions. This blog post explains why “we have a great IT department” is a common cybersecurity myth that could put your organization at risk.
- Cybersecurity Tip: It’s anticipated that 25 billion connected devices will be in use by 2021, according to Gartner. Create an inventory of each device connected to your organization’s network, and develop a plan for installing security patches and software updates.
Securing Devices at Home and Work
- Cybersecurity Risks in a Remote Work Environment – The shift to more remote work brings new cybersecurity considerations. Watch this five-minute video on our Facebook page to learn how to address common cybersecurity risks in a remote work environment.
- Top Cybersecurity Myths: Cybersecurity Is Not My Problem – Learn why cybersecurity is not “just an IT problem” and how you can make it a priority for your entire organization.
- Cybersecurity Tip: Remote work creates new challenges and risks. Download our checklist of security reminders for employees working from home.
Securing Internet-Connected Devices
- Application Security: Understanding the Risks – How far does your organization truly need to go when implementing application security? This article explains common threats affecting organizations and their applications and the impact they can have.
- Checklist of Controls to Secure Internet of Things (IoT) Devices – Hackers can exploit Internet-connected devices to access your network. Download this checklist of controls to help secure the Internet of Things (IoT) devices in use at your organization.
- Three Cyber Scams You May Be Hit with Before 2020 Ends – Watch this short video on our Facebook page to learn about three cyber scams ministries are likely to see before the end of the year.
- Cybersecurity Tip: Internet-connected devices, commonly known as Internet of Things or IoT devices, are everywhere! Do you use smart TVs, Amazon Echos, or wireless multi-function printers? Does your organization have thermostats, environmental monitoring, alarms, cameras, doorbells, light switches, or other equipment that connects to the Internet? All these devices may seem harmless, but hackers often exploit them to gain a foothold into your network. Remember: if you can connect it, you need to protect it!
The Future of Connected Devices
- Managing the Risk from Mobile Devices – Better management and security controls for mobile devices should be part of the cybersecurity strategy at every organization. Consider these five steps to reduce your organization’s cyber risk.
- Top Cybersecurity Myths: The Cost of Security Is Too High – While cybersecurity requires financial resources, it’s a myth to think that the cost is too high to justify. Here’s why not investing in security now can cause significant financial loss in the future.
- Cybersecurity Tip: There is a hacker attack every 39 seconds on average, according to a study from the University of Maryland. Ongoing employee cybersecurity training is a vital tool in reducing your risk of a successful attack. Learn more here.
If you have questions about any of these resources or would like to discuss how the CapinTech team can help your organization reduce your cyber risk, please contact us at [email protected].