Cybersecurity is currently a key element for the competitiveness of companies. According to data from the threat report carried out by Bitdefender 2020, ransomware attacks on companies registered a year-on-year increase of 715%. Therefore, it is essential to have tools and a defined strategy for data protection.

Unfortunately, there are several cybersecurity myths. Specifically, what types of methods are most effective. At Quest Software we explain a list of myths and the real facts that debunk them so that organizations can protect their most important asset: information.

Myth #1: A strong password is enough to keep you safe.

Of course, having a complicated password is always important when creating new accounts online, but it shouldn’t stop there. Facts :

  • Changing your password every 120 days reduces the chance of being hacked and exposing yourself to online dangers.
  • Using strong, unique passwords for every account you have makes it more difficult for a hacker to use the same username and password for your other accounts.
  • Use a password manager to keep track of all passwords if they are too unique/hard to remember or if you change them regularly.

Myth #2: Most cyber threats only come from outside sources.

You are likely to hear more about external attacks that gain access to data. In reality, internal security breaches are also common if proper employee training is not applied. Facts :

  • Protects the physical location/access of servers to reduce the risk of theft or tampering.
  • Train employees on essential security measures to take when accessing and managing sensitive information or documents online.
  • Control access to internal data among all staff members by giving specific authentication depending on each person’s role.

Myth #3: If there is a password on a Wi-Fi network, it is secure.

Although it is more difficult to hack a Wi-Fi connection with a password, there are still vulnerabilities you should be aware of and ways to protect yourself. Facts :

  • Anyone using a public Wi-Fi connection can be subject to a man-in-the-middle attack between their computer and router, introducing malware to the device, or creating fake access points that look like real networks to connect to.
  • Only visit websites with HTTPS at the beginning of the URL, as this encrypts the data and makes the site more secure.
  • Install a VPN (Virtual Private Network) that will route Internet traffic to a company-owned server, preventing intruders from seeing your information.

Myth #4: Cybersecurity requires a significant financial investment.

Of course, hiring an entire in-house IT team to manage cybersecurity is expensive and not always feasible. Facts :

  • You can value the external consultancy of manufacturers and technology companies with experience for the creation of an effective security plan depending on your needs.
  • Don’t forget to also create a disaster recovery plan with your technology partner to document all the steps in the event that you suffer a cybersecurity attack.

Myth #5: You can achieve cybersecurity with just one isolated action.

Staying on top of your cybersecurity is an ongoing effort. You may have all the right tools and strategies in place, but the landscape is always evolving. Facts :

  • Make a company-wide effort to carefully handle all data appropriately and provide up-to-date training to maintain continuity.

In conclusion, we can say that cybersecurity is a priority, and it will increase in importance as more businesses transact online and share information digitally. Staying current with the best approaches to enterprise security will help you build a more effective cybersecurity plan, as well as a disaster recovery plan in the event of an attack.