The COVID-19 pandemic is creating significant disruptions in business operations. Wherever possible, we strongly recommend that businesses put continuity plans in place to facilitate remote work and collaboration for an extended period of time. As a part of these continuity plans we recommend ensuring that remote workers are able to conduct their business securely, and that functionality is tested before going in to production.
Microsoft engineers recently presented research at the RSA security conference indicating that 99.9% of compromised accounts aren’t using multi-factor authentication (MFA). This statistic alone illustrates the enormous potential for MFA to mitigate account breaches when passwords are either guessed or exfiltrated.
We were thrilled and honored to be invited to participate in a cybersecurity panel hosted by the Arlington Chamber of Commerce alongside Arlington’s Economic Development BizLaunch initiative on Wednesday, January 29th, 2020.
Cybersecurity is a critical part of every business’ operational durability. Without attention to it, an attack can be crippling. We recommend business owners and managers view cybersecurity as an investment, rather than a sunk cost, as it pays in dividends of business continuity and resilience.
Business operators are rightfully fearful of cybersecurity breaches. They can cause irreversible reputational harm, leave trade secrets and work product exposed as well as create financial and legal risks.
But just how does a cybersecurity breach occur and what does the process look like? Let’s take a closer look.