BWD Fall/Winter 2016-2017 | Page 9

Fall / Winter 2016-2017 | BWD 9

1 )

2 )

3 )

4 )

5 )

6 )

7 )

Malicious cyber attacks vary from country to country . For example , 55 percent of all breaches in France are committed by hackers and criminal insiders . In Brazil , this number is 30 percent . Therefore , it ’ s important to thoroughly review and gain an understanding of the biggest threats in the new market , as well as all of the cyber security rules and regulations .
Align your cyber security strategy with your business objectives and the aforementioned laws . Determine whether you need customized strategies for the different regions in which you do business , or whether a centralized security department would work better for your company . The former provides organizations with experts on the regulations , laws , customs and culture of their new location . However , those who prefer the latter find that a unified cyber security strategy is a better option for their companies .
Train all of your employees on the proper safeguards to implement in the countries in which they work . Employee awareness can determine whether or not an attack is successful , as 23 percent of recipients open phishing messages and 11 percent click on attachments . It is necessary to ensure that employees are familiar with the most common cyber security risks in their areas and realize their responsibility in avoiding them .
Focus on the confidentiality , integrity and availability of your organization ’ s data . Ensure access to data is only given to those who need it to perform their job responsibilities . Regularly confirm the accuracy of the data to avoid corruption . And make sure the data is available to those with approved access whenever it is needed .
In 2015 , the amount of zero-day vulnerabilities — that is , vulnerabilities unknown to the software ’ s manufacturer — increased by 125 percent . When securing data centers , deploy controls similar to those at your local offices . Put a firewall in place and make sure company devices are tested for any vulnerabilities . When zero-day vulnerabilities are found , follow a predetermined protocol to identify the new risk , inform key stakeholders and immediately implement a plan of action to seal them .
While traveling for business , make sure laptops and mobile devices are encrypted and secured . These devices should not be connected to public wireless networks ; instead , portable hotspots should be used . Additionally , be aware that there are data import and export restrictions that differ by country .
Conduct a geopolitical risk assessment that takes into account threats and vulnerabilities based on your organization , industry and the business expansion location . This assessment should include government stability , disaster recovery and business continuity planning . Research has shown that having a business continuity plan in place can reduce the cost of a data breach by approximately $ 7.10 per compromised record .
When your company expands internationally , keep in mind that many of the cyber security issues you face locally are the ones you ’ ll continue to face — simply on a larger and more complex scale . Planning ahead and educating your employees on how to protect your company ’ s data is the most effective way to handle any cyber attacks that come your way … every minute of every day .
ABOUT THE AUTHORS
Jessica is a Principal with Rehmann ’ s consulting department , focusing on technology risk management . She provides information technology consulting and security services to a wide range of clients . Contact her today at jessica . dore @ rehmann . com .
Chris is Rehmann ’ s Information Security Officer . He has a wide range of experience that includes information security , risk management , system administration and workflow automation . Contact him today at chris . lavrack @ rehmann . com .