Top 5 Myths about Cybersecurity Uncovered

Despite cybersecurity being such a burning topic, there are still several questions and assumptions surrounding it that disallow organizations from truly arming themselves against cyber attacks.

With so many events happening in the cyber world, it can be difficult to separate fact from fiction.

Below, we clear the air on some of the top cybersecurity myths so you can be more informed about cybersecurity and how it can affect your business 

Myth #1: All Your Digital Information Is Safe

If you’ve been reading the headlines as of late, then you know that even the mighty can fall. We’re talking about the Equifax breach that leaked Social Security and driver’s license numbers of over 140 million people.

If one of the top three consumer credit reporting agencies in the world can fall victim to a data breach, then is anyone safe? The short answer? No.

However, there are many steps you can take to protect yourself, such as using the internet only on encrypted networks or making strong passwords for your online accounts.

Myth #2: It’s up to a Company to Protect Your Information

While a company may be liable if your information is stolen, it likely won’t be impervious to cybersecurity fails. In fact, about 80% of all American companies have been hacked successfully - and those are just the ones that report breaches.

It’s up to you to protect yourself with smart and secure passwords. Using a password generator or your wedding date might be tempting, but don’t use these methods to create your passwords. You need to follow password generation best practices and change your passwords twice per year to stay secure. Any more frequent than that, and you might not put in enough effort to creating a unique login. The result is actually a weaker password.

Additionally, never store your passwords digitally. Go with the traditional pen-and-paper tactic, and keep them somewhere safe. Be sure to use a different password for each account so if one is exposed, the rest of your online life isn’t compromised.

Interview with a Hacker about Security

Interview with a Hacker

Gain Your Edge is a twice-monthly podcast on all things IT. This week’s guest is a bona fide hacker. Bill Gardner is an assistant professor at Marshall University where he teaches in the Digital Forensics and Information Assurance degree program. He is an information security author and speaker. During this episode, Bill mentions several resources and references which are presented in this podcast for your information.

Myth #3: All Hackers Are Bad

On the contrary, many hackers are on the front lines of the cybersecurity war, helping companies fortify their own and their customers’ information. Think of good hackers, or white hat hackers, as Glinda the Good Witch of the South, compared to bad hackers as the Wicked Witch of the West - fundamentally, they do the same thing, but it’s the ethics and intent that define the hacker.

You can actually learn a lot from hackers if you hire some to build your cyber defense. For example, they can give you insights into how you can protect yourself or which practices are currently putting your business at risk for a breach.

If you’re interested in enhancing your IT and cybersecurity knowledge, learn from the pros with the Gain Your Edge podcast. It covers all sorts of cutting-edge topics twice per month to help keep you safe and secure.

Myth #4: You’d Know If You’d Been Hacked

You can be hacked through a larger data breach from companies like Target and Equifax without being aware that an issue occurred. Additionally, your computer and personal accounts could be compromised without your knowledge.

While some malware infects your computer or a company’s devices in an obvious way, others go undetected, siphoning your information and putting you at risk for identity theft.

A great way to ensure you know right away if you’ve become the victim of a cyber attack is by running your credit report every few months, checking your bank statements every month, and following up on strange bills you receive from utility companies or medical providers.

The FTC has a complete list of what to watch out for if you suspect you’ve become a victim of identity theft so you can protect yourself. You can also consider getting insurance for identity theft and cyber attacks to pay for lawyers, bills, and replenish stolen funds if you ever face this issue.

Myth #5: It Won’t Happen to You, and If It Does, It’s No Big Deal

It’s funny how so many people think they could win the lottery (the chances are one in 292 million or 0.000000003%) but has no chance of falling victim to cyber attacks (47% of Americans had their identities stolen in 2014 alone, much of which were due to hacks).

Every year, there are over 1.5 million cyber attacks worldwide, averaging about three cyber attacks per minute. What does this cost us besides grief and time? About $400 billion collectively each year in the direct financial loss as well as indirect costs such as loss of sensitive data and the cost of recovering from a hack.

Prepare yourself now with these tips so that if you do become the victim of a cyber attack, you know how to approach the situation.

While you shouldn’t feel like you need to erase your online presence and go back to pen and paper to stay safe, you should use the information and tips mentioned above to protect yourself.

Related Resouces

Download the Paper

Technology Disaster Preparedness & Recovery Guide
This white paper details how taking a few precautionary steps now, you will be able to avoid many potential technology and data disasters and be well prepared to deal with those you cannot avoid. Download Now!

Download the Paper

Building the Next-Gen Intelligent Network
This white paper describes how to achieve a sophisticated level of connectivity and how companies will increasingly need to partner with vendors who can put together the intelligent network skeleton on which the virtualized, cloud computing enterprise can grow. Download Now!

Download the Paper

Securing Your Network in the Age of Bring Your Own Device
This paper looks at the ever-increasing use of mobile devices, and why corporations must stay in tune with its consumerization, implementing a Bring Your Own Device policy to ensure the security of all parties involved - the employee and the corporation. Download Now!

Download the Paper

3 Frontier Communications Case Studies
Learn how Frontier built network solutions for 3 different companies, from Wi-Fi system to Internet-based telecommunications and power infrastructure, Frontier tailored specific solutions to fit each business needs. Download Now!

Download the Paper

3 Things You Need to Know Before Hiring an IT Consultant
This white paper shows you how to have a valuable relationship with an IT consultant and how to ask the right questions about their qualifications, verifying their experience in your industry. Download Now!

Download the Paper

Say Hello to the Right Technology
In this eBook, we’ll examine connectivity solutions that can address these issues and provide workgroups with the tools they need to be more productive, helping businesses run more efficiently. Download Now!

More from Frontier Business

Article Topics

Frontier Business News & Resources

Learn How to Avoid Outdated Technology in Your Company
Say Hello to the Right Technology
10 Resolutions Every Small Business Should Make in 2018
Fundamentals of Cloud Computing - What is SaaS, PaaS, IaaS and How They Affect Your Business
Ethernet: The Go-To Tool for Sharing Big Data
Four Ways to Link Your Multiple-Location Business
Assisting in Transition to Cloud-Based Technologies
More Frontier Business

Latest in Technology

Talking Supply Chain: Co-existing with the robots
Artificial Intelligence to Drive M&A Activity in Supply Chain
Cleo Announces New Supply Chain Management Tools for Integration Cloud Platform
Bank of America Introduces Digital Supply Chain Finance Platform
Talking Supply Chain: Is Generative AI the future of the supply chain?
Logility Acquires Generative AI Supply Chain Planning Firm Garvis
Perpetual Power Comes for AMRs
More Technology

We’re not just a provider, we’re your partner. At Frontier, we get to know your business and offer you tailored solutions designed to meet your demands and continued growth. Solving real business problems with tailored network solutions, so you never pay for something you don’t need. That’s what we call Custom(er) Fit™.

View Frontier Business company profile


Featured Downloads

Becoming a Shipper of Choice
Becoming a Shipper of Choice
C3 solutions' scheduling software streamlines the shipping process.
Thinking Differently About Supply Chain Planning
Thinking Differently About Supply Chain Planning
Political landscapes shift overnight, global trade is constantly changing, consumers demand increasingly personalized service and smaller day-to-day challenges hit without warning. If...

Rapidly Improve the Performance of Your Warehouse Logistics
Rapidly Improve the Performance of Your Warehouse Logistics
The Rapid Performance Evaluation identifies opportunities and potential improvements in every aspect of warehouse logistics operations; performance, productivity, service, quality, and systems.
Resource Management System (RMS): How to Effectively Leverage Your Assets
Resource Management System (RMS): How to Effectively Leverage Your Assets
This guide provides an in-depth analysis of the potential of various resources available in a warehouse and how they can be utilized...
Sustainable Supply Chain Insights From PITT OHIO
Sustainable Supply Chain Insights From PITT OHIO
A whitepaper on supply chain insights gleaned at the LEED-certified gold Cleveland transportation and sustainability summit.