Telecoms without cybersecurity is a risk with too high a toll to payNew patterns of work indicate a gradual development of cybercrime, effective action and a well-organized strategy to keep company information under lock and key.
A survey conducted by the labor law consulting firm “Steelcase” among executives of various large companies in the United States, Canada, Mexico, Italy, England or Spain, but whose proper names have not not been provided, showed that Of more than 8,000 organizations across industries, 72% plan to continue with the hybrid working model,
Thus, as the report points out in its findings, companies and employees in this position are the ones who should receive the most cybersecurity training and awareness, using passwords, information, access points and company data.
Telecom: five pillars of cybersecurity planning
Although each industry and position has its own specificities, these are: five basis points who has to say everything Cybersecurity plan for businesses with virtual presenceIt builds on the government-approved ‘Cyber Security Shock Plan’ as part of a new package of measures against cyber threats.
National Cybersecurity Plan, concluded with more than 1,000 million euros
New General State Administration Cybersecurity Operations Center
Strengthening the security of the new 5G electronic communication network pic.twitter.com/0RnWS5ohhA
— La Moncloa (@fromlamoncloa) March 29, 2022
- Identify what you want to keep, Knowing the sensitivity of the organization is the first step. For example, a retail company may need to focus more on platforms with strong access or identification mechanisms or keep in mind that administrators and employees use passwords unique. In contrast, a logistics company should focus its security efforts on employee-operated file downloads, emails, and equipment.
- Password and system updated, Although it seems obvious, it is rare. It is necessary to strengthen the passwords and change them frequently and update the operating system of the device. Also inform employees of the latest virtual technologies used by criminals, such as “phishing”, in which many people are tricked by links seen in emails, social networks or WhatsApp messages, or “ransomware”. , in which money is requested to be used. Blocked system, whose attack rate climbs to six cases per minute, according to INCIBE. It is therefore advisable never to share information or work tools.
- allocate a budget, “Employees should be trained in cybersecurity,” says Yevgeny Kaspersky, executive director of Antivirus, in which his surname is named after him. The most important is the money invested in the training and awareness of users with access to remote devices in order to initiate a prevention and security plan.
- subscribe to an insurance, Like auto or home insurance, in the digital environment, damage is predictable. Thus, cybersecurity policies are designed to rectify or repair certain types of impacts depending on the industry. Although they do not prevent attacks, they ensure business continuity. In this case, additional funds will have to be allocated to recover what has been lost. Currently, as the consulting firm Deloitte points out, there are different coverage plans without involving large investments.
- generate continuous processes, Instead of reacting, we should stop. That workers are aware that keeping data, equipment and information in a safe place is an ongoing process and not a one-time one. According to Kaspersky, cyberattacks will continue to grow by 24% in 2022.