{"id":215160,"date":"2022-01-03T09:05:52","date_gmt":"2022-01-03T01:05:52","guid":{"rendered":"https:\/\/techwireasia.com\/?p=215160"},"modified":"2021-12-31T19:43:03","modified_gmt":"2021-12-31T11:43:03","slug":"ten-cybersecurity-resolutions-for-a-safer-2022","status":"publish","type":"post","link":"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/","title":{"rendered":"Ten cybersecurity resolutions for a safer 2022"},"content":{"rendered":"
New year, new resolutions \u2014 here are ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in.<\/span><\/p>\n A TrendMicro <\/span>survey <\/b><\/a>found that 90% of IT decision-makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. 82% also felt that they have been pressured to downplay the severity of cyber risks to their board.\u00a0<\/span><\/p>\n Whilst a data breach might make organizations prioritize cybersecurity, the costs of handling one would be immense \u2014 we\u2019re talking <\/span>US$5 million per breach<\/b><\/a> immense.\u00a0<\/span><\/p>\n Why would you buy umbrellas after the rain? <\/span><\/p>\n Customers say that <\/span>safety and security are most important to them<\/b><\/a> online. KPMG suggests that businesses adopt a transparent approach to how data is used, stored, and shared. This will not only assuage the worries of users but also help to build consumer trust in a brand.<\/span> Ransomware will be the largest threat to businesses this year. Sophos recommends having proper IT hygiene policies across the company. <\/span> Eighty percent of hacking-related breaches can be attributed to weak or compromised passwords, according to Verizon\u2019s 2019 Data Breach Investigations Report.\u00a0<\/span><\/p>\n So, passwords aren\u2019t enough. <\/span>Multi-factor authentication (MFA) <\/b><\/a>should be the new norm.<\/span><\/p>\n Yes, we\u2019ve said this ad nauseam. We\u2019re saying it <\/span>again<\/b><\/a>. And <\/span>again<\/b><\/a>.<\/span><\/p>\n Over 60% of consumers around the globe have <\/span>fallen prey to tech support scams<\/b><\/a>.<\/b> Victims tend to be younger men, and also very overconfident of their IT literacy skills.<\/span> 5G technology is gaining increased uptake in the Asia Pacific and will see more use in 2022. However, it does come with security concerns, especially as it may enable a wider threat surface area for attackers. <\/span> We thought remote working would be decreasing. Boy, were we wrong, especially given the rapidly spreading Omicron variant. <\/span> Only a third of developers truly understand the security policies they work with. This disconnect between security teams and software developers hinders initiatives like Zero Trust implementation and securing the cloud.\u00a0<\/span><\/p>\n Companies should <\/span>foster closer relationships<\/b><\/a> between developers and the security team so all ICT members are on board and fully understand how policies and processes will be like.<\/span><\/p>\n Well, if your company is smaller and you can\u2019t afford a security team, then <\/span>cybersecurity MSPs<\/b><\/a> (managed service providers) are a solution.<\/span><\/p>\n But make sure you get the advice of a skilled and experienced cybersecurity member to ensure you\u2019re not overpaying for services you don\u2019t need.<\/span><\/p>\n New year, new resolutions \u2014 here are ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in. 1. Prioritize cybersecurity\u00a0 A TrendMicro survey found that 90% of IT decision-makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or… Read more »<\/a><\/p>\n","protected":false},"author":631,"featured_media":215164,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[12,2804,6,2372],"tags":[2701,3408],"yoast_head":"\n1. Prioritize cybersecurity\u00a0<\/strong><\/h4>\n
2. Don\u2019t neglect data protection and privacy\u00a0<\/strong><\/h4>\n
\n<\/span>
\n<\/span>Don\u2019t betray their trust, ensure you have the right<\/span> data protection<\/b> <\/a>and <\/span>data privacy<\/b><\/a> policies in place within your digital ecosystem.<\/span><\/p>\n3. Institute and maintain IT and cybersecurity hygiene policies<\/strong><\/h4>\n
\n<\/span>
\n<\/span>Ensure <\/span>proactive countermeasures<\/b> <\/a>such as monitoring features, backups, and training in security skills to enable early detection. Ensure all staff has the latest security updates and patches installed on their devices.<\/span><\/p>\n4. Passwords are not enough<\/strong><\/h4>\n
5. Zero-trust is your friend\u00a0<\/strong><\/h4>\n
6. Beware tech support scams\u00a0<\/strong><\/h4>\n
\n<\/span>
\n<\/span>So what should businesses do? Consider AI chatbots instead for tech support.<\/span><\/p>\n7. Prioritize 5G security\u00a0<\/strong><\/h4>\n
\n<\/span>
\n<\/span>As such, it\u2019s time to prioritize 5G security both <\/span>MNO-side<\/b><\/a> and <\/span>business side.<\/b><\/a><\/p>\n8. Increase remote working security\u00a0<\/strong><\/h4>\n
\n<\/span>
\n<\/span>Companies should continuously implement and reinforce <\/span>user-friendly cybersecurity tools and policies<\/b><\/a>,<\/b> and users should improve on their security standards at home.<\/span><\/p>\n9. Break IT team silos down\u00a0<\/strong><\/h4>\n
10. \u2026 or outsource IT security\u00a0<\/strong><\/h4>\n
\nThe Tech Wire Asia team wishes you and yours a Happy and Cyber-secure New Year!!<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"