Four biggest cyber security mistakes a business can make

The risk of cyber attacks continues to be a major problem for companies of all sizes, with the cost of security breaches rising last year.

According to the 2014 Information Security Breaches Survey published by PwC and commissioned by the Department for Business Innovation and Skills, for one in ten organisations the scale of the attacks was so severe, it caused them to change the nature of their business.

Unfortunately, in the rush to defend themselves against the exponential risks posed by cyber terrorism, many companies are making some fundamental mistakes in their cyber security policies. Here are four of the biggest:

1. Impossible goals

The most common mistake by most organisations is the drive towards a 100% secure environment, and whilst this would seem like an appropriate ambition, it remains an unfeasible goal.

Every organization must accept that its networks will have vulnerabilities and a targeted attack will result in a breach. The focus must be on prioritising the security of data on the basis of importance, speeding up identification processes and having robust recovery plans in place.

2. Narrow responsibility

Companies must acknowledge that the issue of cyber security is not simply the responsibility of the IT department. With the drive towards more accessibility and flexibility for workers, data has never been more vulnerable and technology can only go so far to protect it.

3. Bad practice with passwords

Many IT departments and end users believe they have strong and robust password protection, but closer inspection reveals this not to be the case. The basic principles apply here; use complex passwords, change them frequently and never re-use passwords across multiple systems.

4. Being unadaptable

Many organisations invest in world-class software and technology, and assume that an autonomous approach will protect them against hackers. Unfortunately, this isn’t the case and, in a war where specialist intruders are constantly developing their approach, so too must those who are vulnerable constantly monitor, adapt and invest in new technology.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy