Consulting with a Conscience™

A cruciallogics blog

close
Written by Amol Joshi
on June 20, 2019

In the old days, thieves would hold up their victims while waiting in line at the bank, or by grabbing a wallet from a stranger’s purse. Today, cybercriminals have uncovered far more lucrative means of stealing- by infiltrating the tech infrastructure of companies and demanding large sums of money in exchange for the release of captured personal data. 

Phishing and ransomware have become increasingly common in recent years[1]. It’s estimated that in 2019, a new organization will fall victim to a ransomware attack every 14 seconds! That’s an increase of over 97% in the past two years. Still not convinced of the risk to your organization? Consider these facts:

- Ransomware generates more than $25 million for hackers every year
- Less than a third of organizations who pay the ransom ever receive their money back
- Every month, more than 1.5 million new phishing sites are created
- The average cost of a data breach is $4 million[2] per incident
- 81%[3] of breaches involve a stolen or weak password

Protecting Your Data
To begin better protecting your organization, you should take stock of your current strengths and weaknesses. What protective mechanisms do you currently have in place? Do you know the answers to any of the following questions?

1) Who is accessing your data?
Within your organization, what checks and balances have you implemented for data access? Do you have a hierarchy with permissions, or are you granting access on a per-case ad-hoc basis?

2) Can you grant access based on risk?
How responsive is your permission process? Does it take weeks to grant a new employee access to the databases they need? Or on the opposite end of the spectrum, are you not taking enough time to vet each request?

3) Is your data protected on the cloud, on devices, and in transit?
Working in today’s digital landscape means that data is constantly on the move. Do you understand how your data is travelling between stakeholders, and can you be assured that it’s protected?

4) How quickly can you find and mitigate a breach?

What controls do you have in place to monitor your security? Once a breach is detected, how do you react?

Increase Security with Microsoft 365
With a 99.9% malware catch rate, and 45 second average file detonation time, Microsoft 365 is an industry-leading, cloud-based option that remains vigilant on your behalf, 24 hours a day, 7 days a week.

Threat Protection
Prevent attacks and quickly recover should a breach occur.

Access and Identity Management
Control access to resources and protect your users.

Information Protection
Authorize the right people to view documents and emails.

Security Management
See and control all your security tools.

Take advantage of Azure ATP to protect hybrid enterprise environments from advanced attacks and insider threats. Harness the power of Windows Defender ATP for preventative protection, attack and zero-day exploit detection, and centralized security management.

Choose CrucialLogics
As a Microsoft Gold Partner, CrucialLogics clients benefit from our DEEP technical expertise. We understand how to utilize the unparalleled security features of Microsoft 365 and Azure, and we put them to work for your organization quickly and seamlessly to ensure that each system is optimized to address your unique security concerns.

Want all the stats?  

Download Infographic


To learn more about how we can help your organization be better protected against cyber-attacks,
contact us today.

 

[1]Phoenix NAP, “27 Terrifying Ransomware Statistics and Facts You Need to Read”, https://phoenixnap.com/blog/ransomware-statistics-facts

[2]Source: 2016PonemonInstitute Cost of a Data Breach Study

[3]Source: Verizon 2017 Data Breach Investigations Report

You may also like:

Data Security

Download our FREE Infographic: 8 Ways to Control Data Sharing

Do you know how valuable your data is? Not just valuable to you, but valuable to those who seek to profit from your data...