Four ways we can fight cyber attacks in 2016: 3. Corporate responsibility

Most of the biggest and most memorable cyber attacks in recent months have been the ones that targeted high profile corporations, such as TalkTalk, Google and Ashley Madison. These are companies that many of us trust with our sensitive data, including credit card numbers, names and addresses, so it is of paramount importance that all manner of corporations, who operate online to any extent, do whatever they can to ensure that they are not vulnerable to cyber attacks in 2016 and beyond.

Awareness

There are a number of things that corporations should to do ensure that they are acting in a responsible way. One of the simplest is being aware of cyber crime and the latest hacks and scams, so that they can warn staff, take measures to prevent their customers becoming victims, and warn their customers to be on the lookout for things like malware or dodgy emails.

Investment

Corporations must also invest well in anti-cyber crime software, cyber security staff and improved hardware if they are to decrease their chances of suffering from an attack. They really cannot afford to cut corners when hackers are becoming ever more sophisticated in their approach.

Encryption

Good encryption protocols are extremely important for any corporations that store sensitive data. They make it much more difficult for hackers to obtain sensitive information in the event that they are able to breach cyber security and access stored data.

Passwords

Creating strong passwords, that are tough to crack, and changing them regularly is one of the simplest things companies can encourage their employees to do to thwart hackers and cyber criminals.

Aside from implementing these measures, of course, the best thing any corporation can do is seek the help of a cyber security expert, perhaps having at least one on staff, so that they can stay ahead of the curve when it comes to fighting cyber attacks in 2016.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy