So are ‘irresponsible use of AI’ and ‘ideological cyber warfare’. Here are a few sets of tips to keep organizations safe…

Tiquet has cited six key measures that can help business leaders mitigate breach risks and protect their organization’s sensitive data.

  1. Secure user credentials: Even this fundamental baseline security measure is hackable due to cookie hijacking. Organizations should therefore enforce password hygiene and implement MFA everywhere possible.
  2. Prioritize incident response planning: A well-structured plan ensures that if a breach occurs, the organization can quickly and effectively manage and mitigate its impact. This plan should be regularly updated and tested to identify and address any weaknesses. It should also be an integral part of the overall cybersecurity strategy, not an afterthought.
  3. Minimize data collection and enforce access controls: Limit data collection to only what is absolutely necessary for operations. Enforce strict access controls to ensure employees have temporary access to ONLY the data they need for their roles.
  4. Conduct cybersecurity training and develop a strong cyber culture: Employees are the first line of defence against cyber threats. Implement comprehensive cybersecurity training programs to equip employees with the knowledge and skills to recognize and respond to threats. Conduct frequent training sessions and phishing simulations to keep employees updated on the latest threats and best practices.
  5. Implement Zero Trust security and identity and access management: A policy of least access can prevent unauthorized privilege escalation. Use a Privileged Access Management or identity and access management platform.
  6. Strengthen security against third party vendors: Supply chain attacks illustrate how external vendors and partners could be a weak link used by attackers. To mitigate these risks, organizations should establish clear security requirements for vendors and insist on proof of robust security controls. Work with vendors that are SOC 2 Type 2 and ISO 27001 compliant or hold similar security certifications. Choose service levels that match your organization’s security needs, as many providers offer varying levels of security features.