Technology News

Top 5 Myths about Cybersecurity Uncovered

Despite cybersecurity being such a burning topic, there are still several questions and assumptions surrounding it that disallow organizations from truly arming themselves against cyber attacks.

With so many events happening in the cyber world, it can be difficult to separate fact from fiction.

Below, we clear the air on some of the top cybersecurity myths so you can be more informed about cybersecurity and how it can affect your business 

Myth #1: All Your Digital Information Is Safe

If you’ve been reading the headlines as of late, then you know that even the mighty can fall. We’re talking about the Equifax breach that leaked Social Security and driver’s license numbers of over 140 million people.

If one of the top three consumer credit reporting agencies in the world can fall victim to a data breach, then is anyone safe? The short answer? No.

However, there are many steps you can take to protect yourself, such as using the internet only on encrypted networks or making strong passwords for your online accounts.

Myth #2: It’s up to a Company to Protect Your Information

While a company may be liable if your information is stolen, it likely won’t be impervious to cybersecurity fails. In fact, about 80% of all American companies have been hacked successfully - and those are just the ones that report breaches.

It’s up to you to protect yourself with smart and secure passwords. Using a password generator or your wedding date might be tempting, but don’t use these methods to create your passwords. You need to follow password generation best practices and change your passwords twice per year to stay secure. Any more frequent than that, and you might not put in enough effort to creating a unique login. The result is actually a weaker password.

Additionally, never store your passwords digitally. Go with the traditional pen-and-paper tactic, and keep them somewhere safe. Be sure to use a different password for each account so if one is exposed, the rest of your online life isn’t compromised.

Interview with a Hacker about Security

Interview with a Hacker

Gain Your Edge is a twice-monthly podcast on all things IT. This week’s guest is a bona fide hacker. Bill Gardner is an assistant professor at Marshall University where he teaches in the Digital Forensics and Information Assurance degree program. He is an information security author and speaker. During this episode, Bill mentions several resources and references which are presented in this podcast for your information.

Myth #3: All Hackers Are Bad

On the contrary, many hackers are on the front lines of the cybersecurity war, helping companies fortify their own and their customers’ information. Think of good hackers, or white hat hackers, as Glinda the Good Witch of the South, compared to bad hackers as the Wicked Witch of the West - fundamentally, they do the same thing, but it’s the ethics and intent that define the hacker.

You can actually learn a lot from hackers if you hire some to build your cyber defense. For example, they can give you insights into how you can protect yourself or which practices are currently putting your business at risk for a breach.

If you’re interested in enhancing your IT and cybersecurity knowledge, learn from the pros with the Gain Your Edge podcast. It covers all sorts of cutting-edge topics twice per month to help keep you safe and secure.

Myth #4: You’d Know If You’d Been Hacked

You can be hacked through a larger data breach from companies like Target and Equifax without being aware that an issue occurred. Additionally, your computer and personal accounts could be compromised without your knowledge.

While some malware infects your computer or a company’s devices in an obvious way, others go undetected, siphoning your information and putting you at risk for identity theft.

A great way to ensure you know right away if you’ve become the victim of a cyber attack is by running your credit report every few months, checking your bank statements every month, and following up on strange bills you receive from utility companies or medical providers.

The FTC has a complete list of what to watch out for if you suspect you’ve become a victim of identity theft so you can protect yourself. You can also consider getting insurance for identity theft and cyber attacks to pay for lawyers, bills, and replenish stolen funds if you ever face this issue.

Myth #5: It Won’t Happen to You, and If It Does, It’s No Big Deal

It’s funny how so many people think they could win the lottery (the chances are one in 292 million or 0.000000003%) but has no chance of falling victim to cyber attacks (47% of Americans had their identities stolen in 2014 alone, much of which were due to hacks).

Every year, there are over 1.5 million cyber attacks worldwide, averaging about three cyber attacks per minute. What does this cost us besides grief and time? About $400 billion collectively each year in the direct financial loss as well as indirect costs such as loss of sensitive data and the cost of recovering from a hack.

Prepare yourself now with these tips so that if you do become the victim of a cyber attack, you know how to approach the situation.

While you shouldn’t feel like you need to erase your online presence and go back to pen and paper to stay safe, you should use the information and tips mentioned above to protect yourself.

Related Resouces

Download the Paper

Technology Disaster Preparedness & Recovery Guide
This white paper details how taking a few precautionary steps now, you will be able to avoid many potential technology and data disasters and be well prepared to deal with those you cannot avoid. Download Now!


Download the Paper

Building the Next-Gen Intelligent Network
This white paper describes how to achieve a sophisticated level of connectivity and how companies will increasingly need to partner with vendors who can put together the intelligent network skeleton on which the virtualized, cloud computing enterprise can grow. Download Now!


Download the Paper

Securing Your Network in the Age of Bring Your Own Device
This paper looks at the ever-increasing use of mobile devices, and why corporations must stay in tune with its consumerization, implementing a Bring Your Own Device policy to ensure the security of all parties involved - the employee and the corporation. Download Now!


Download the Paper

3 Frontier Communications Case Studies
Learn how Frontier built network solutions for 3 different companies, from Wi-Fi system to Internet-based telecommunications and power infrastructure, Frontier tailored specific solutions to fit each business needs. Download Now!


Download the Paper

3 Things You Need to Know Before Hiring an IT Consultant
This white paper shows you how to have a valuable relationship with an IT consultant and how to ask the right questions about their qualifications, verifying their experience in your industry. Download Now!


Download the Paper

Say Hello to the Right Technology
In this eBook, we’ll examine connectivity solutions that can address these issues and provide workgroups with the tools they need to be more productive, helping businesses run more efficiently. Download Now!


More from Frontier Business


Article Topics
Best Practices   Technology   Security   Cybersecurity   All topics


Comments
Be the first to post a comment.
You must be logged in to post a comment. Login.

 
Latest Technology News
Five Keys to “Click and Collect” Order Fulfillment
To meet consumer demand for more convenient delivery options, many retailers have adopted the buy online and pick-up-in-store (BOPIS, or "click-and-collect") order fulfillment model.

5 Ways to Assess Your Warehouse Technology Needs
When looking to leverage new technology, each warehouse must assess their business and determine the solutions that offer not only best practices that are tried and true for today’s customers, but also…

Material Handling Tips For Maximizing Warehouse Space
Warehouse storage space is expensive, so it makes sense to make the most of your warehouse storage capacity in order to reduce carrying costs and increase material handling efficiency.

Swisslog Optimizes Efficiency at the North Pole
Swisslog automation and software is making Santa's job easy...


 

24|7 Pro Team

The 24|7 Team is your direct pipeline to solutions for your business challenges. It's your opportunity to have supply chain and logistics experts look at your specific challenges and needs, and give you free, no-obligation advice, solutions, and information.

The 24|7 Team will simplify the task of creating a database of likely partners, building your knowledge base, and preparing your Request for Proposal list.

1
  Choose a topic for your RFP

Transportation RFP/RFI

The Transportation RFP is your direct pipeline to solutions for your transportation challenges. It's your opportunity to have logistics experts look at your specific transportation challenges and needs, and give you free, no-obligation advice, solutions, and information specific to your request.

Choosing the perfect software or system can be an indomitable challenge. Using this transportation/TMS RFP will simplify the task of creating a database of likely partners, building your knowledge base, and preparing your Request for Proposal list.

Warehouse/DC Management RFP/RFI

The Warehouse Management Systems (WMS) RFP is your direct pipeline to solutions for your WMS challenges. It's your opportunity to have logistics experts look at your specific WMS challenges and needs, and give you free, no-obligation advice, solutions, and information specific to your request.

Choosing the perfect WMS solution can be an indomitable challenge. Using this WMS RFP will simplify the task of creating a database of likely partners, building your knowledge base, and preparing your WMS Request for Proposal list.

Supply Chain RFP/RFI

The Supply Chain RFP is your opportunity to have logistics experts look at your specific challenges and needs, and receive free, no-obligation advice, solutions, and information. It simplifies finding a pool of likely partners, building your knowledge base, and preparing your Request for Proposal list. The companies in the Logistics Planner have agreed to respond to your request for in-depth information and follow-up, and your request is totally confidential.

Software/Technology RFP/RFI

The Software/Technology is your direct pipeline to solutions for your logistics information technology challenges. It's your opportunity to have logistics experts look at your specific technology challenges and needs, and give you free, no-obligation advice, solutions, and information specific to your request. Whether it's WMS, TMS, Mobile or Cloud, our pros can help.

The companies listed below have agreed to respond to your request for in-depth information and follow-up. Your request is totally confidential.

Executive Education RFI

The Logistics and Supply Chain Education RFI can help you identify the schools, coursework, continuing education, distance learning and certification opportunities available from leading logistics educational institutions.

Upgrade and improve your logistics and supply chain skillsets. Whatever route you choose—advanced degree, executive education, certification or distance learning—the time and money you invest in your education today can pay off in continued career success tomorrow. Contact leading universities and professional institutions for the information you need to prepare for the future.

Third Party Logistics RFP/RFI

This 3PL Request for Proposal (RFP)/Request for Information (RFI) can help you find the 3PL and 4PL providers that can meet your specific 3PL service challenges and needs. The 3PL companies below will provide free, no-obligation third-party logistics advice, solutions, and information.

Ask your 3PL questions, you'll get answers. Simply complete the information, and detail your 3PL challenges. Then, check off the third-party logistics companies that you want to review your request.

1. Choose an RFI topic.
2. Enter your contact information and challenge.
3. Select companies and optional categories.
4. Submit.


2

Your Information



Your Challenge, Problem or Request *

3

Select Transportation Companies

  • Select All

  • 3Gtms
  • BluJay Solutions
  • CSX Trans. Intermodal
  • Kuebix
  • Landstar
  • Legacy Supply Chain Svs.
  • One Network
  • Pitt Ohio
  • Purolator
  • Quintiq
  • SEKO Logistics
  • SMC3


Select Relevent Categories

  • Air Freight
  • Intermodal
  • Motor Freight
  • Ocean Freight
  • Rail Freight
  • TMS

Select Warehouse/DC Management Companies

  • Select All

  • 3PL Central
  • Apex Supply Chain Tech.
  • Honeywell Intelligrated
  • Kuebix
  • Legacy Supply Chain Svs.
  • Swisslog
  • Westfalia Technologies
  • Zebra Technologies


Select Relevent Categories

  • Auto ID & Data Capture
  • Automation
  • Conveyors & Sortation
  • Lift Trucks
  • Packaging & Labeling
  • Pallets & Containers
  • Shelving & Racking
  • WMS

Select Supply Chain Companies

  • Select All

  • 3Gtms
  • 3PL Central
  • Amber Road
  • Apex Supply Chain Tech.
  • APICS
  • BluJay Solutions
  • CSX Trans. Intermodal
  • Frontier Business
  • Kuebix
  • Legacy Supply Chain Svs.
  • Logility
  • One Network
  • Purolator
  • Quintiq
  • SMC3
  • Synchrono
  • TAKE Supply Chain
  • Westfalia Technologies
  • Zebra Technologies


Select Relevent Categories

  • Global Trade
  • Inventory Management
  • Risk Management
  • Sustainability

Select Software/Technology Companies

  • Select All

  • 3GTMS
  • 3PL Central
  • Apex Supply Chain Tech.
  • BluJay Solutions
  • Honeywell Intelligrated
  • Frontier Business
  • Kuebix
  • Logility
  • One Network
  • Quintiq
  • SMC3
  • Swisslog Logistics
  • Synchrono
  • TAKE Supply Chain
  • Zebra Technologies


Select Relevent Categories

  • ERP
  • Sales & Operations
  • Sourcing/Procurement
  • Optimization
  • Transportation Mgmt
  • Warehouse Mgmt

Select Executive Education Choices

  • Select All

  • Graduate Courses
  • Online/Distance
  • Executive Education
  • Certifications
  • Undergraduate
  • Seminars
  • Associations
  • Conferences
  • Tradeshows


Select Third Party Logistics Companies

  • Select All

  • 3PL Central
  • Landstar
  • Legacy Supply Chain Svs.
  • Purolator
  • SEKO Logistics
  • Westfalia Technologies


4
 

24|7 Company Profiles