Intelligent CISO Issue 40 - Page 39

FEATURE programmes to be updated regularly to help maintain defences .
Adopting Zero Trust models for businesses to prevent cyberthreats should also become normalised , as the approach will encourage employees to not trust anything inside or outside of the corporate system . Businesses that consider all networks hostile can gain an advantage in defending their perimeters . This will become increasingly more important when we see employees return to the office later this year .
Sectors that are repeatedly targeted , such as healthcare and education , should implement a comprehensive backup strategy to a post-attack recovery plan . This will allow organisations to reduce downtime disruptions and may prevent them from needing to pay a ransom .
Finally , businesses need to remember the importance of Two-Factor Authentication ( 2FA ) and ensure they regularly test their security defences .
As attacks usually begin with an employee clicking on a malicious link from an email , and with hybrid working here to stay , launching training programmes that help to educate employees on phishing scams and spam emails is crucial . Cyberattacks can ’ t always be prevented , but having the correct measures and training in place can make it more difficult for a successful attack to be carried out . Once these steps are taken , businesses can rest assured that they will be better protected from the cyber kill chain evolution . u www . intelligentciso . com
39