Microsoft engineers recently presented research at the RSA security conference indicating that 99.9% of compromised accounts aren’t using multi-factor authentication (MFA). This statistic alone illustrates the enormous potential for MFA to mitigate account breaches when passwords are either guessed or exfiltrated.
We were thrilled and honored to be invited to participate in a cybersecurity panel hosted by the Arlington Chamber of Commerce alongside Arlington’s Economic Development BizLaunch initiative on Wednesday, January 29th, 2020.
Cybersecurity is a critical part of every business’ operational durability. Without attention to it, an attack can be crippling. We recommend business owners and managers view cybersecurity as an investment, rather than a sunk cost, as it pays in dividends of business continuity and resilience.
Business operators are rightfully fearful of cybersecurity breaches. They can cause irreversible reputational harm, leave trade secrets and work product exposed as well as create financial and legal risks.
But just how does a cybersecurity breach occur and what does the process look like? Let’s take a closer look.
We all know that awful feeling when technology isn’t working as we expect, or worse yet, we suspect our security has been breached. It sparks anxiety, frustration and even impulsive decision making. But just how did we get to such an unpleasant place?