Network Access - December 2019 January 2020

Top 5 Reasons to Take Cyber Risk Seriously

What You Should Know About Log Monitoring for Regulatory Compliance

One of the Biggest Problems Facing IT Professionals and Management Teams Alike Is That the Value of Those Security Logs Is Often Minimized, or Even Overlooked Entirely The threat from hackers and cyberattackers has never been greater, and no company is too small or large to fall victim to this danger. Whether you own a small mom-and-pop shop, a major multinational corporation, or a business that is somewhere in between, you cannot afford to leave the security of your firm and the customer information you collect to chance. That is why so many businesses are installing sophisticated software to detect security breaches, catch hacking attempts at their earliest stages, and alert the IT staff at the first sign of trouble. But simply installing that software is not enough. In order to be useful, the results those security programs generate must be carefully analyzed, and that is what log monitoring is all about. Log monitoring is more than just a good idea and much more than a way for businesses to keep their customer data safe. Careful monitoring of security logs is also the law, and there are extensive regulatory requirements governing everything from the detection of cyberattacks and hacking attempts to the way successful and unsuccessful attempts at intrusion are handled and reported. In fact, a large percentage of event management and log management activities are deployed to meet the requirements of regulatory compliance. Even so, the proscriptions regarding security practices in general, and log monitoring in particular, are often vague and confusing, making the job of the IT department that much harder and more complicated. One of the biggest problems facing IT professionals and management teams alike is that the value of those security logs is often minimized or even dismissed entirely. IT pros may recognize the value of security software and log monitoring, but convincing their bosses to allocate the required resources is often an uphill battle. IT professionals can fight back against that complacency by focusing on the regulatory necessity of log monitoring and how carefully checking the daily security logs could shield the company from legal liability in the event of a breach. Getting the management team onboard and demonstrating how log monitoring is the first line of defense is essential, and to do that, IT professionals need a basic understanding of the applicable regulatory requirements. Understanding the ins and outs of the regulatory framework is no easy task, but having a basic understanding of how these regulations work and where they fit into the big picture is essential. Log monitoring is a vital part of computer security in the digital age, and neglecting that monitoring could have disastrous consequences. By arming themselves with information and presenting their findings to the management team, IT professionals can get the support they need to keep their systems safe and secure and keep their companies out of regulatory and legal hot water.

Bah Humbug

1. The main root causes of a data breach in the U.S. are malicious/ criminal attack, human error, and system glitches. 2. Any organization that retains physical or electronic records of employees, customers, or other third parties is vulnerable and can be a victim of a cyber event. 3. 95% of businesses rely on their computer systems functioning properly for their business to operate. If systems go down due to a glitch, error, or attack, businesses can be at risk of suffering loss of income and customers. becoming more advanced with infections up 40% within the past year. Extortion events can have a significant impact on business’s operations and often require payment of ransom to regain access to data and systems. 4. Ransomware is evolving and

5. 49% of organizations with at

least one significant attack were successfully attacked again within one year.

2

412-931-1111

www.NetworkAccess.com

Made with FlippingBook Publishing Software