Stuff

    Subscribe to our newsletter

    What's Hot
    MTN telecoms

    MTN working on a plan to keep its operations going during load shedding

    June 30, 2022
    Top Five Budget Smartphones

    Stuff’s Top Five Budget Smartphones (at the moment)

    June 30, 2022
    Switch to Android

    Google’s Switch to Android app finally supports Android 12 – Here’s how to use it

    June 30, 2022
    Facebook Twitter Instagram YouTube SoundCloud
    Trending
    • MTN working on a plan to keep its operations going during load shedding
    • Stuff’s Top Five Budget Smartphones (at the moment)
    • Google’s Switch to Android app finally supports Android 12 – Here’s how to use it
    • This is what a R65 monthly Snapchat+ subscription buy users
    • FNB cashes in on the fuel price hike by giving away more eBucks when you buy fuel
    • AM.CO.ZA EasyRoute CNC routers score RouterCAM software upgrade, new stock inbound
    • Vodacom’s coding initiative is working to get more girls involved in STEM
    • It’s 2022. Why do we still not have waterproof phones?
    Facebook Twitter Instagram YouTube
    Stuff Stuff
    • News
      • App News
      • Business News
      • Camera News
      • Gaming News
      • Headphone News
      • Industry News
      • Internet News
      • Laptops News
      • Motoring News
      • Other Tech News
      • Phone News
      • Tablet News
      • Technology News
      • TV News
      • Wearables News
    • Reviews
      • Camera Reviews
      • Car Reviews
      • Featured Reviews
      • Game Reviews
      • Headphone Reviews
      • Laptop Reviews
      • Other Tech Reviews
      • Phone Reviews
      • Tablet Reviews
      • Wearables Reviews
    • Columns
    • Stuff Guides
    • Podcasts & Videos
      • Videos
      • Stuffed
      • Stuffing Around
      • Tech Byte
      • T2S2
    • Win
    • Subscribe
      • Print
      • Digital
        • Google Play
        • iTunes
        • Download
        • Zinio
    • Stuff Shop
      • Shop Now
      • My Account
      • Downloads
    • Contact Us
      • Get In Touch
      • Advertise
    0 Shopping Cart
    Stuff
    Home » News » Security News » A unified cyber security strategy is the key to protecting businesses
    News

    A unified cyber security strategy is the key to protecting businesses

    The ConversationBy The ConversationMay 28, 2022Updated:May 27, 2022No Comments4 Mins Read
    cybersecurity
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Following the changes the pandemic has brought about in the business world, organizations have significantly increased their use of data and the internet. This, in turn, has increased the prevalence of cyberattacks and cybersecurity risks.

    Accounting firm PricewaterhouseCoopers recently released a report estimating that about 62 per cent of Canadian organizations were impacted by ransomware incidents and attacks in 2021.

    Since these risks have crucial implications for companies and their investors and clients, cybersecurity spending saw a major increase. Global cybersecurity spending grew to more than $120 billion in 2017 from $3.5 billion in 2004.


    Read more: Cyberattacks are on the rise amid work from home – how to protect your business


    The Center for Strategic and International Studies estimates that malicious cyber activity costs the world $945 billion annually, while Cybersecurity Ventures estimates that global cybercrime costs could increase to $10.5 trillion by 2025.

    As a result, investors, clients, suppliers and employees are demanding better management and protection of corporate data, along with better cybersecurity accountability and transparency to mitigate increased cyber risks.

    In an article soon to be published in the Journal of Management and Governance, we argue that better cybersecurity and data protection can be achieved through a formal program put together after a careful auditing process. We outline the objectives of such a program below.

    A shared responsibility

    The responsibility of cybersecurity management no longer falls just on the shoulders of IT departments, but is now the responsibility of the entire business. We argue that all firm departments should be involved in cybersecurity programming and planning.

    Management and directors should be directly involved in carrying out best practices to mitigate cybersecurity risk. Firm managers should lead by example by embedding security throughout their company’s operations and responding rapidly to cyber threats as they arise.

    Corporate board members should ensure the necessary cybersecurity protections are in place for their companies, and approve and review the cybersecurity governance and data protection program regularly.

    At the very least, every board should have one cyber expert with proven, up-to-date credentials on its panel. This will lead to better protection for company investors, clients, suppliers and employees.

    Auditing is the first step

    The first step in creating such a program is to assess the current effectiveness of an organization’s cybersecurity risks and data management through a program like the Canadian government’s Cyber Security Audit Program or one of the U.S. government’s auditing resources. These publicly available tools help auditors assess the cybersecurity of their organizations.

    As part of the audit, businesses should also hire third-party hackers to test the security of their systems through a penetration test. Hackers bring a unique insight to the audit process, and are capable of finding gaps that security professionals might overlook.

    During a penetration test, hired white- or grey-hat hackers carry out an authorized cyberattack to try and find vulnerabilities in a business’s cybersecurity defences. Once detected, businesses can tighten their security to prevent these vulnerabilities from being exploited.

    This assessment would provide businesses with a road map for creating a cybersecurity action plan to ensure the protection of sensitive information systems, and the data and privacy of a company’s employees, investors and clients.

    Creating the program

    A comprehensive cybersecurity and data protection plan should cover a wide variety of areas, including the creation and safeguarding of passwords, remote and restricted access, email encryption, social media, anti-virus measures, contingency plans, data breach responses and training programs.

    Crucially, it would also involve the creation of an IT disaster recovery and emergency plan. Businesses must be prepared for any number of disasters, including power outages and cyberattacks, and be able to act accordingly to recover any lost data.

    We also recommend that companies create a whistleblowing policy, since 42 per cent of occupational fraud is reported through tips and more than half of those tips come from employees. A good whistleblower policy will include a hotline for complaints and ensure confidentiality and protection for all whistleblowers.

    Ultimately, a high quality cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity risks. The internet is only becoming more and more integral to business operations as the years pass. If companies want to stay abreast of new technological developments, they will need to make cybersecurity central to their organizations.

    • Camélia Radu is an Associate Professor in Accounting, Université du Québec à Montréal (UQAM)
    • Nadia Smaili is a Professor in Accounting (forensic accounting), Université du Québec à Montréal (UQAM)
    • This article first appeared on The Conversation

    cybersecurity online security Whistleblowing
    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    The Conversation

      Related Posts

      MTN telecoms

      MTN working on a plan to keep its operations going during load shedding

      June 30, 2022
      Top Five Budget Smartphones

      Stuff’s Top Five Budget Smartphones (at the moment)

      June 30, 2022
      Switch to Android

      Google’s Switch to Android app finally supports Android 12 – Here’s how to use it

      June 30, 2022

      Leave A Reply Cancel Reply

      In The Mag
      Stuff June-July 2022 Latest Issue

      In This Issue – The Outdoors (June-July 2022) Issue

      By Brett VenterMay 30, 20221

      Once again, we are asking you to check out a new issue of Stuff Magazine.…

      2021 Wish List
      wish list Stuff Wish List 2021

      Stuff Wish List: for the tech impaired

      By Duncan PikeDecember 22, 20210

      Are you from the time before being glued to a smartphone was considered normal? Here’s…

      Wishlist DIY Stuff tech

      Stuff Wish List: for the DIY Diehard

      December 21, 2021
      Wish List Gearhead

      Stuff Wish List: For the petrol-soaked gearhead

      December 20, 2021
      outsiders

      Stuff Wish List: for the Outsiders

      December 17, 2021

      Latest Video

      Sonos

      SONOS Roam SL unboxing by Toby Shapshak

      March 30, 2022
      Mini Cooper

      The Mini Cooper SE Electric with Toby Shapshak

      March 18, 2022
      MSI Crosshair 15 Rainbox Six Extraction Edition unboxing

      MSI Crosshair 15 Rainbox Six Extraction Edition unboxing

      March 16, 2022
      Samsung Galaxy S22 Ultra Unboxing

      Samsung Galaxy S22 Ultra unboxing with Toby Shapshak

      March 16, 2022
      Contact

      South Africa's Consumer Tech News Hub

      General: [email protected]
      Subscriptions: [email protected] or 087 353 1291
      Editorial: 072 735 2614
      Sales: 083 375 2418

      Facebook Twitter Instagram YouTube SoundCloud

      Subscribe to Updates

      • Terms and Conditions
      • Privacy & POPI
      • My account
      © 2022 Stuff Group. Designed by Chronon.

      Type above and press Enter to search. Press Esc to cancel.