Cybersecurity: Are Passwords Your Vulnerability?

Cybersecurity strategies need to take into account vulnerable areas, such as employee passwords.Don’t let employee negligence be the source of a data breach. Cybersecurity has never been more important, yet too few companies are doing what they should to protect themselves in areas that can be easily remedied with a few important steps.

According to a study by password management firm Keeper Security, 81 percent of data breaches are due to weak passwords, or passwords that were stolen or still set to default. The same study found that almost 60 percent of people use the same password for everything. What can you do to ensure your employees are practicing safe password procedures?

Cybersecurity attacks continue to become more targeted and severe, carrying heavy consequences for victims. Despite the threat, a study by the Ponemon Institute shows that instead of becoming more prepared, many companies are doing less.

The Ponemon survey found that 61 percent of respondents had reported a cyberattack, which is a six percent increase over the year prior. Almost 54 percent reported that their data had been breached, which is up from 50 percent a year earlier. A ransomware attack became a reality for 52 percent of respondents, and more than half of those said they got hit more than once.

What steps can you take to protect against a cyberattack?

·       Gain more visibility into employee password practices

·       Don’t use the same passwords for accessing multiple accounts

·       Don’t share passwords

·       Use strong passwords that are not easily compromised

·       Develop a password policy and enforce it

·       Implement a control policy regarding BYOD (bring your own device)

·       Train security staff more frequently

·       Update antivirus software and encryption software

The costs associated with stolen records are severe; enough to sink some companies, particularly when you consider the average cost of a data breach is around $1 million-plus. The ongoing lack of preparation and neglect of developing more robust password policies puts many companies at great risk, which is why it’s important to take proactive steps to remediate weaknesses.

At Focal Solutions, we’ve developed a number of processes that make telecom easy. Our team is committed to the success of your business, and that includes making sure you’re secure with robust cybersecurity solutions. We have a mission to develop long-term advocacy for our clients and know industry best practices. Contact us today to learn more.

The Model for a Successful Enterprise Today Includes Embracing the Cloud

Enterprises gain agility and the ability to scale up and down with an investment in the cloud.Enterprises of the 20th century were accustomed to housing their infrastructure onsite, managing all aspects of IT and navigating changes in the market gradually. As cloud solutions become more widespread, it will help level the playing field and allow smaller, more agile companies to edge out bigger, lumbering enterprises.

CIOs are seeing the benefits of paying a subscription fee rather than investing in a big hardware spend. The frequent updates and advances in software applications mean that cloud solutions make sense for enterprises that want to stay competitive both in efficiency and in the customer experience.

Scalability is leveling the playing field. It used to be that only the biggest enterprises could enjoy the advantages of the best software, but subscriptions make it easy for small- and mid-size companies to access the same tools large enterprises are using. For any size business, subscriptions make a team more agile, able to scale up or down based on changes in the marketplace.

Enterprises — the finance department, in particular — love the subscription model of cloud options because the investment can be categorized as an operational expense, rather than a capital investment. The ability to scale up or down also lowers the fixed costs of the enterprise and makes it easier to adjust spending to accommodate demand.

Everything as a Service (XaaS) is now an option. While Software as a Service (SaaS) and Infrastructure as a Service (IaaS) have been in use for a long time, the growing service industry is also allowing for the growth of other service areas, including security management and managed services. The XaaS mindset is dominating conversations about digital transformation as executives weigh the benefits of housing more of their IT management with service providers.

The service economy has plenty of room for growth. The market is just entering a shift from “procure and maintain” to a full-service economy. Enterprises are embarking on plans to embrace XaaS models of completing business processes, but there is a lot of opportunity for service providers to capture growth in emerging technologies like artificial intelligence, the Internet of Things, and Big Data analytics.

The shift to the service economy is evident across a variety of industries. Examples like car-sharing or pay-by-the-hour jet rental can be compared with companies in the financial arena sharing data management services.

If you’d like to capture new opportunities in the service economy, Focal Solutionscan help you. When you choose Focal Solutions as your trusted telecom partner, you are choosing to extend the range and value of your own IT team. Contact us today to learn more.