Before you go to sleep at night, you probably lock your doors. When you park your car you probably make sure that no valuables are visible from the street and that your doors are locked as well. You may even keep your valuables locked in a safe in your house.
With locks and keys clanging around our bags and our lives, we are so in tune with physical security; unlike cybersecurity, it’s tangible. However, with instances of cyber attacks having increased 48% in 2014, it is imperative that cybersecurity become as second nature as physical security.
Here’s how physical security practices translate to cybersecurity practices:
1.) Protecting your valuables.
You leave your doormat and potted plants on your front porch, confident that no one will take them, but your family, pets and valuables remain safe behind locked front doors. You know what criminals want and therefore take extra precautions to protect these things. The same applies to cybersecurity. Cybercriminals are not interested in reading your dry email correspondences with a coworker. Cybercriminals want sensitive personal and corporate data. Therefore, exercise additional caution when accessing or transferring data of this nature. Use a VPN with properly implemented SSL or IPSec security measures for secure remote access to corporate data.
2.) Distrust of the unknown.
We teach our children this from infancy with the adage, “Don’t talk to strangers.” The same goes for cybersecurity. Don’t distribute compromising cyber data information to strangers in cyberspace. Establish network “trust zones” to determine with whom you share corporate data. This is especially relevant in branch office connectivity, where corporate data must be shared across a wide range of contacts and geographical locations. If an employee is terminated or resigns, be sure that they no longer have access to your company VPN.
3.) Having a plan.
As cyber space is crowded with scams and hoaxes, we often don’t take cyber threats seriously. However, in public places such as school campuses and airports, safety threats are treated with the utmost gravity. Just as school districts implement strict public safety protocols, companies too should implement a safety procedure to follow at the first sign of a cyber threat.
Don’t keep the cyber-door to your cyber-house open with your cyber-diamond necklace exposed to cybercriminals. Protect precious information with a VPN with SSL or IPSec security measures in place, only allow trusted sources access to your information and take cyber threats seriously. One cyber attack has the power to permanently mar a corporation.
More information on secure VPN solutions can be found on www.hobsoft.com
You must be registered in order to write comments. To register as a new user click here.
If you're already registered, please leave a comment here