• Security
  • 17/10/2020
The Cyber Security Landscape - Best Practices to Protect Your Business Data

What business owners consider to be valuable assets will vary from one business owner to another  but when all is said and done - it's all data.

You may consider the privacy of your assets to be an asset in itself; as this may relate to your identity and anonymity. Maybe you don’t want some things associated with your identity. This could be anything from your browser history, what you download or something you share on social media.

What you consider to be assets are individual to you and your business.

However, many if not all of us share most of the following common denominators:

Your valuable assets may consist of:

  • Your Identity; Your Privacy; Your Anonymity; Your Content; Your Files; Your Accounts; Your Financial Details; Your Email; Mobile & Online Activity; Your Geo Location

Your privacy. Your anonymity. Your files. It's all data at the end of the day.

What security controls should you choose?

We consider it best practice to apply security through various security controls to protect what you value. This means you really need to understand completely to what degree your security and IT infrastructure services are resisitant to threats from those who pose them.

We select security controls based on the types of threats and adversaries we face.

There a many security controls to choose from such as:

  • Tor, VPN, JonDonym, Opsec, Encryption, 2FA, Patching, HTTP filter, Firewall, OpenPGP, SSL/TLS, HTTPS, SSH

 

The biggest threats to your data

Threats are the unsavoury dangers to your data that can materialise in the cyber landscape such as:

  • Vishing, Phishing, Spying, Adware, Spyware, Rootkits, RATS, Viruses, Malware, Mass Surveillance, Regulating Encryption, Exploit Kits, Legalized Spying, Backdoors

 

Who is posing these threats?

Threats must be manifested and enabled by an appropriate agent for them to be realised. The people who enable threats to your assets could be:

  • Spies, Nation-States, Hackers, Hacker Groups, Crackers, Colleagues, Oppressive Regimes, Cyber Criminals, Law Enforcement, Ex-Partner (if you’re unlucky!), and Governments

 

Our engineers define risk by the probability of a possible threat exploiting vulnerabilities in both your systems and security controls plus the potential consequences of a threat materialising. There is risk to your business data so as long as a cyber criminal considers business data to be valuable. 

For all of us in the digital era - our privacy, identity and anonymity are all under the same umbrella of what it is that whets a hackers' appetite.

Those who pose the threats are your enemy. You protect yourself by thinking of them as the enemy.

Understanding the threat landscape you face is knowing your enemy.

Click to calculate to what degree your business is at risk based off assets you consider valuable.

Recent Post

The Cloud Question

Security

Are IT preconceptions holding the business back?

Security

How secure is the Cloud?

Security

The Six R's of Cloud Migration

Security

Cloud Computing and the Property Sector

Security

Related Posts

  • Security
  • Jan

Do we value our data enough to protect it?

I’m sure you know yourself. You know your business. Of course you want to protect everything in it,

Read More
  • Security
  • Jan

Privacy or anonymity? - Which is more important in the digital era?

Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi

Read More
  • Security
  • Jan

If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l

Read More
  • Security
  • Jan

The Cyber Security Landscape - To what degree is your business at risk?

It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never

Read More