Trace Id is missing

Cyber security from industry leaders: start secure, stay secure

Securing sensitive information is critical for any enterprise desiring to maintain industry leadership; a task made ever more difficult because of the digital age in which we operate, where there is constant connection between our businesses and increasing numbers of malicious actors. Criminality is not the only concern when it comes to guarding our digital assets, as negligent employees and system glitches are also root causes of data breaches. Up to half of all departing employees knowingly or unknowingly leave with company information in their possession asserts the Microsoft Modern Workplace webcast, “Information Protection: Guarding Your Digital Assets”.

 

With ample threats abounding, what is a company to do?

 

“Start Secure, Stay Secure,” says Curtis W. Dukes, EVP & GM of Security Best Practices & Automation Group. And, if you find that you haven’t started securely, then do whatever is necessary to get secure and then stay that way! Implementing digital best practices and system controls promote good cyber hygiene which is essential to a strong security posture. Any business desiring to grow and prosper in today’s tumultuous digital world must be built upon a solid foundation of cyber security.

 

Evan Anderson, CEO of INVNT/IP says that it’s critical to cover your bases by hiring cyber security professionals. While IP and data security should be a company-wide priority, not enough can be said for hiring highly trained people to oversee and anchor your operations. Hiring cyber security professionals is essential for maintaining the digital hygiene necessary to stay competitive and covered in today’s marketplace. Doing so will not prevent disasters from occurring, but it will ensure that our companies weather those storms successfully intact. Outsourcing this component of your infrastructure allows companies to focus the bulk of their attention back on the core operations for which their businesses exist.

Microsoft 365: more than a collaboration tool

Discover four ways that Microsoft 365 brings teams together. Check out how it helps businesses evolve the way they collaborate.

These suggestions have proven to be very financially beneficial according to Ponemon Institute’s 2017 Cost of Data Breach Study. In this report they find that having an incident response plan and team in place, extensive use of encryption, and employee training are the top three factors in reducing the costs involved in a data breach. Most experts agree that it’s not a matter of “if” we will suffer a breach, but rather “when”. To believe this is not fatalism on our part, it’s prudence. Being proactive and planning for the eventuality of an attack is key to mitigating not only the risk of an attack, but also the loss incurred in an attack.

 

Knowing that there are innumerable threats to our digital security shouldn’t paralyze us, rather it should prompt us to prepare with earnest. These hazards should spur our resolve to train ourselves and our staff to take an active part in risk awareness and data security. In protecting our businesses, we are really safeguarding environments for employee ingenuity. So, mitigating our cyber risk produces great rewards as well-protected organizations become hotbeds for growth and innovation.

 

I urge everyone to register for and view the Microsoft Modern Office on-demand webcast, “Information Protection: Guarding Your Digital Assets”, here. You’ll learn much more about the significant cost of cyber theft and what Microsoft and other industry leaders are doing to help companies stand ready and defended.

Kenneth Holley is the founder and CEO of Silent Quadrant – a Washington, D.C.-based information technology services and consulting practice serving the nation’s top lobby firms. Over the past twenty-four years, he has provided IT and cybersecurity consulting services for the leading organizations influencing policy in the United States. With a particular focus on infrastructure security and data analytics, he has assisted many clients, including foreign sovereigns, to ensure brand and profile security, as well as building engaged communities within the social media realm.

Get started with Microsoft 365

It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.

Related content

Business Tech

Shielding Success: The Power of Robust Passwords for Small Business Security

Business Tech

Protect Your Files on PC and Cloud: 10 Essential Tips and Best Practices

Business Tech

Are your files secure in the Cloud?

Business Insights and Ideas does not constitute professional tax or financial advice. You should contact your own tax or financial professional to discuss your situation.

Follow Microsoft 365