Reducing the risk of cyberattacks

May 10, 2018

Cyberattacks around the world are on the rise. Whether they result in a data breach or a disruption in network or service availability, criminal cyber activity can have a huge financial impact on an organization. The costs can include cleaning up and restoring a network as well as reestablishing trust with partners and customers alike. According to a 2017 research study conducted by the Ponemon Institute, the average cost of a data breach is around $3.6M.

Whether it involves the theft of millions of customer credit card numbers or theft of Intellectual Property (IP), a cyberattack can impact more than just the bottom line. As we’ve seen from high-profile cases in the news, your organization’s reputation can be at stake.

To mitigate the risks associated with an attack and achieve cyber resilience, you need to develop a comprehensive cybersecurity strategy and partner with trusted vendors.

5 steps toward creating greater cybersecurity

Increasing your organization's cybersecurity can seem like a daunting task. But the following five steps can help get you started.  They are based on a framework from The U.S. Commerce Department’s National Institute of Standards and Technology (NIST), which provides guidelines, standards, and best practices for cybersecurity-related risk management.

  1. Identify. You must pro-actively monitor the market and potential threats and provide ongoing guidance and support to all your employees.
  2. Protect. Share cybersecurity best practices and ensure that everyone has access to the latest software, firmware, and cyber protection features.
  3. Detect. Monitor your systems closely, and, if you detect a potential vulnerability, share this information with all stakeholders, including those outside your organization.
  4. Respond. In the event of a cyber breach, contain the impact and provide assistance to affected stakeholders as well as employees in your organization.
  5. Recover. Support recovery planning within your organization so you can restore any affected systems and service.

The importance of working with trusted vendors

Another important aspect of cybersecurity-related risk management requires assessing your supply chain.  In general, effective supply chain risk management (SCRM) is essential for protecting and ensuring continuity and profitability and requires developing a network of trusted vendors.

The same principle applies to the supply chain that provides an organization with the components that make up their physical security system. It is also crucial for any cybersecurity strategy that you protect your system by building a network of trust. Since any system is only as strong as its weakest point, you need to ask questions about whether or not the manufacturer developing or organization installing devices on your network are trustworthy. 

At Genetec, we get this. We take our position in the industry seriously and are committed to developing relationships built on collaboration, and transparency. As part of our commitment, we develop our products with cybersecurity in mind. By design, our solutions protect everyone’s privacy without compromising security.

In addition, we keep an up-to-date list of firmware with known security vulnerabilities and proactively warn customers with issues related to their security system. Our customers also have access to the latest firmware updates, including automated updates that have the latest cybersecurity features.

It’s important to remember that, in our increasingly connected world, hardening your system against criminal cyber activity is about more than just securing your perimeter. The reason it requires open and transparent communication is because it can impact us all. Cybersecurity must be a true community effort.

Find out more about our approach to cybersecurity

Previous Video
Webinar: How to reduce your risk and avoid GDPR penalties
Webinar: How to reduce your risk and avoid GDPR penalties

Are you an IT or Corporate Security Manager that wants to reduce your risk when managing and sharing video?...

Next Flipbook
GDPR for non-Europeans
GDPR for non-Europeans

How should non-EU businesses prepare for the GDPR?