Know your enemy: As of Summer 2022, what are 5 sources/types of potential digital threats to your organization?
Five types of potential digital threats to an organization are Social Engineering Attacks, Third Party Exposure, Configuration Mistakes, Poor Cyber Hygiene, and Ransomware Attacks.
Social engineering relies on human mistakes and manipulating people to gain access to a system. Email impersonation would be an example of this by pretending to be someone you trust to get information, money, or access to data.
Third-party exposure is a way of targeting a less protected network with privileged data to access your information. Facebook, Linkedin, and Instagram experienced this when Socialarks, a contractor employed by them, was hacked and personal data got leaked.
Configuration mistakes are human errors in the installation or setup of software that leave the system vulnerable. An employee who has experienced a decline in mental health during the pandemic may become careless during a setup and miss something important.
Poor cyber hygiene is the security habits of individual workers that may be lacking. With weak passwords, no use of a VPN, or the lack of a two-factor authentication system.
Ransomware attacks are threats to publish private data or permanently block access to a system unless a ransom is paid. Once gaining access to a company network a hacker may restrict access to it unless a ransom of $20,000 is paid.
Know yourself: Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated to gain access to valuable corporate or customer data.
The company uses many different digital systems and processes in place for the use of employees like ATS, Collaborative Systems, Delivery systems, Data Managers, and an Online Ordering System for our website and online store.
ATS (applicant tracking system) is a digital system in place to optimize the hiring process of new employees by determining which candidate is best qualified for the position. This system could be exploited to gain information about the employees and other applicants.
Collaborative systems like meeting rooms, chatrooms, and discussion boards are used to gather colleagues together for important meetings or discussions. These websites that our employees frequent could be compromised and used to distribute malware to our network.
Delivery systems like DoorDash, GrubHub, and Instacart are used to deliver our online orders to customers. These third-party contractors could be compromised and used for access to customer data and private information.
Data management systems like Pivotree optimize the data from our online store and keep everything organized. This is also a third-party contractor that could be exploited for data.
Online ordering systems like Self-Point make ordering on our website convenient and personalized for the customer. But once again this is a third party with access to our data that could be hacked.
Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be safer, more secure, and more reliable.
Some recommendations I would suggest for minimizing the possibility of online attacks would be to use proper data storage software, Train staff, create Stricter protocols, Keep the System Updated, and Minimize the number of third-party contractors we use.
Using the proper data storage software will ensure that the system is protected and there won’t be an excess of data that leads to confusion and vulnerability.
Training the staff in proper cyber hygiene and educating them against social engineering scams will better protect us from the human mistakes that could lead to disaster.
Creating new protocols and updating the systems we use will ensure we are up-to-date and using the best and newest security technologies.
Staying updated will be the highest priority of the IT department so we don’t get left behind or end up using out-of-date security measures that are easily compromised.
Minimizing the number of third parties that we allow access to our network will protect our data from more vulnerable systems.
Sources:
https://www.embroker.com/blog/top-10-cybersecurity-threats-2022/
https://retail-today.com/pivotree-partners-with-gourmet-foods-international-to-boost-digital-commerce-capabilities/
https://www.prweb.com/releases/gourmet_garage_optimizes_online_shopping_and_customer_convenience_with_self_point_e_commerce_solution/prweb15673697.htm
https://www.winsightgrocerybusiness.com/retail-foodservice/how-digital-saved-deli
https://axiomq.com/blog/5-benefits-of-digital-systems-in-business-management/