BY : SCOTT TEMPLIN , CYBER RISK ADVISOR , LACHESIS , LLC
A graduate of Butler University in 2010 , Scott Templin moved to Northwest Indiana when his wife had the opportunity to return to the family farm in Westville . In his free time , Scott loves sports , cats , board games , and exploring the world with his wife . impact that could occur when something goes wrong .
STEP 2 : VULNERABILITY ANALYSIS
An outside vulnerability assessment is just the tip of the iceberg when it comes to visibility into how secure your business is . It is also important to review policies and procedures when it comes to data backups or how each employee is handling personal information .
STEP 3 : PRIORITIZATION
There are many companies out there that will do an offensive attack on your system to see where your vulnerabilities lie . The key difference between us and them is that by combining that vulnerability analysis with a business cost analysis , we are able to prioritize and even assign a potential dollar value to each threat . Now a business leader with no tech background has the ability to clearly see not only the probability of a threat but also have a better understanding of the cost that could be associated with such an attack .
STEP 4 : THE ACTION PLAN
You have learned about the threat and the cost . Now it is time to put things in place . This could be as simple as updating some software , or it could be a deeper look into how your business handles its data backups .
STEP 5 : CONTINUOUS MONITORING
By constantly screening for new vulnerabilities , you can determine whether the updated security measures implemented are effective . A one-time snapshot of your business from months ago will need to be updated as new threats arise and businesses change and grow .
DISASTER RECOVERY PLAN
Does your business ’ s current disaster recovery plan include steps to take in the event of a cyber disaster such as data loss , hacking , or other similar disruption ? By performing a full cybersecurity assessment now , you can have a plan in place the same way you would in the event of a building fire or the loss of key personnel .
When you start to make changes now to the way you view and focus on your cybersecurity , you can put together a strategic technology plan that will allow you to feel a true peace of mind .
Remember , you do not have to do this alone . Feel free to contact me directly to start finding out what you do not know and how together we can better understand your business ’ s cyber profile .+