Bob Adams

by Bob Adams

Product Marketing Manager - Security

Posted Apr 18, 2018

What are you doing about the threats against your organization?

“My company is impenetrable and no one could ever successfully breach our system in any way.” – Literally no security professional, ever.

I start off with this remark as a reminder that it’s truly impossible to say your organization and your users are infallible.

  • Are you confident the technology you have in place will always be available and stop the next attack targeting your business?
  • Do you honestly trust your users?

These two questions—and many more—are important to consider when evaluating your environment.

Organizations can be taken down in numerous ways and it’s not a matter of if, but when, your company will be unexpectedly offline or the target of an attack.

Technical Failures

Although technology has come a long way, it’s still subject to failure. That potential failure is something organizations need to plan for. In on-premises environments, administrators have long fought for the resources necessary to build out redundant systems with effective backups to ensure they have a failover if needed.

However, this comes at a price not all organizations can afford. Conversely, hosted and cloud-based environments are dependent on their providers for delivering availability and redundancy to keep them online.

Targeted Attacks

Chances are high your business was targeted by some form of a targeted phishing or ransomware attack, but it’s important to understand how and why you’re a target. There are many drivers for attackers – mostly monetarily-driven, but data-gathering and corporate IP is of value as well. The reason for targeting also varies depending on the industry. For instance, healthcare organizations have become a prime target for attackers as patient data has skyrocketed in value on the dark web.

Regardless of an attacker’s reasons, you have something they want and they’ll do whatever they can to get what they’re after. If you’re still worried about your users falling for a Nigerian prince scam, you have a long road ahead. Therefore, it’s vital to understand that attacks have evolved exponentially in the past several years to the point where even seasoned security-conscious users can be duped.

Using advanced threat protection is the first step, but training users is crucial. Implement the right solutions and use teachable moments to train your users. They’re key to preventing targeted attacks from penetrating your defenses.

Human Error

Implementing periodic and continuous training, while also tracking your users’ results, will help you identify weaknesses and strengthen your human firewall. Your users are subject to attacks using malicious URLs, weaponized attachments laden with malware, and even advanced social engineering attacks attempting to get wire transfers or sensitive data.

Chances are you can think of several gaps in users that you may consider “weak links” and it’s only a matter of time before someone exploits that gap.

Just because you’re a target, doesn’t mean you are a victim.

Want more great articles like this?Subscribe to our blog.

Get all the latest news, tips and articles delivered right to your inbox

Bob Adams

by Bob Adams

Product Marketing Manager - Security

Posted Apr 18, 2018

You may also like:

Use Tech to Mitigate Email Security Issues

Secure Emails: 6 Do’s and Don’…

Secure Emails: 6 Do’s and Don’ts for IT Pros Whet… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Apr 09, 2018

3 Reasons Why You Need Better Backup and Recovery

Using Microsoft Office 365™ or snapshots…

Using Microsoft Office 365™ or snapshots from your archive s… Read More >

Shane Harris

by Shane Harris

Director, Product Marketing

Posted Apr 03, 2018

What is Cyber Resilience and Why Should I Care? Part 2

Completing your cyber resilience strateg…

Completing your cyber resilience strategy with Durability an… Read More >

Bob Adams

by Bob Adams

Product Marketing Manager - Security

Posted Mar 09, 2018