{"id":15572,"date":"2023-09-28T05:24:13","date_gmt":"2023-09-28T05:24:13","guid":{"rendered":"https:\/\/mysourcefunding.com\/startups\/five-cybersecurity-mistakes-and-how-companies-can-fix-them\/"},"modified":"2023-09-28T05:24:15","modified_gmt":"2023-09-28T05:24:15","slug":"five-cybersecurity-mistakes-and-how-companies-can-fix-them","status":"publish","type":"post","link":"https:\/\/mysourcefunding.com\/?p=15572","title":{"rendered":"Five Cybersecurity Mistakes And How Companies Can Fix Them"},"content":{"rendered":"<div>\n<p><em>Perry Carpenter is Chief Evangelist for <\/em><em data-ga-track=\"ExternalLink:https:\/\/www.knowbe4.com\/\">KnowBe4 Inc.<\/em><em>, provider of the popular Security Awareness Training &amp; Simulated Phishing platform.<\/em><\/p>\n<p>Today\u2019s organizations understand the importance of cybersecurity. They know cyberattacks and data breaches are frequent, more targeted and more dangerous. They recognize the risks of ransomware, the disruption it can cause and the damage it can inflict on organizations.<\/p>\n<p>Though many businesses have a level of technological defenses in place, threats continue to evade security controls, and breaches continue to succeed. Why is that the case?<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">Five Common Cybsersecurity Mistakes<\/h2>\n<p>Let\u2019s understand the top mistakes organizations make with cybersecurity.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">1. Not Taking The Right Leadership Approach<\/h3>\n<p><fbs-ad position=\"inread\" progressive=\"\" ad-id=\"article-0-inread\" aria-hidden=\"true\" role=\"presentation\"><\/fbs-ad><\/p>\n<p>I&#8217;ve noticed leaders often take two types of approaches toward cybersecurity: They care about either compliance or security. If leaders only devote attention to compliance, then most likely security will suffer. It&#8217;s as simple as that.<\/p>\n<p>One can certainly try to educate leadership; however, if their mindset is fixated on compliance, it might push things too far in that direction, making things worse for security teams.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">2. Not Measuring Your Security Baseline<\/h3>\n<p>One might admit, we know our security is broken, so what\u2019s the point of testing or evaluating our defenses? If you will not assess the security posture, including the state of tech controls, vulnerabilities and weaknesses, how will you determine which controls are needed and in what priority? How do you demonstrate progress toward something without defining a baseline?<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">3. Not Understanding The Security Context<\/h3>\n<p>Many security pros live in their own bubble. They follow commonly used security measures. Threats appear identical, whichever angle they look at. They seldom step outside to understand their own business, their own security problems and their own security use cases.<\/p>\n<p>Instead of walking the halls and understanding the business and the security mindset of employees, many security pros deploy blanket tools, processes and practices that are standard across the industry.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">4. Not Staying Current On Threat Intelligence<\/h3>\n<p>Organizations are failing to recognize that threat intelligence is failing them. Even though the adoption of threat intelligence skills, platforms and budgets are on the rise, it&#8217;s worth noting that some businesses are spending time and energy on threats that were discovered months ago.<\/p>\n<p>What\u2019s more, security teams that integrate third-party intelligence tools are often bombarded, overloaded with false-positive alerts, which end up exacerbating the existing problem. Meanwhile, attackers have already moved past those vectors and are using new tools and methods to attack and infiltrate.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">5. Not Focusing Enough On The Human Aspect Of Security<\/h3>\n<p>A majority of cyberattacks and breaches can be traced back to human-related errors. Still, most security teams don\u2019t invest in educating and reminding employees about the evolving nature of threats, how to deal with suspect communications, the importance of staying cautious and vigilant and the consequences of their actions on the organization. It is estimated that nearly one-third of organizations do not offer cybersecurity training to their employees.<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">How Organizations Can Avoid These Mistakes<\/h2>\n<p>Although security isn\u2019t a one-size-fits-all model, it\u2019s important that organizations adopt the following best practices:<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">1. Building Critical Thinking<\/h3>\n<p>As technology evolves, cybersecurity will too. The information, skills or intelligence we have today will no longer be relevant tomorrow. Even if organizations leverage artificial technology to scale threat detection and automation to a level previously unimaginable, AI will still depend on human intervention to drive that capacity. That\u2019s why critical thinking will always be a component in the evolution of cybersecurity.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">2. Improving Agility<\/h3>\n<p>Think about what is needed to learn, improve or defend your company over the next six to twelve months and what actions are being proposed to achieve those results. Then, work on adjusting your agility and maintaining the mental flexibility to keep doing that.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">3. Knowing Your Baseline<\/h3>\n<p>Measure your security baseline consistently to better understand your security posture and quantify progress. You will need this to build, monitor or improve security strategy\u2014whether it&#8217;s deploying a tool, enforcing a policy, laying out a process or improving security awareness among employees.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">4. Using Your Own Context And Intelligence<\/h3>\n<p>Step out of the office, talk to people and build relationships across all levels. Understand employee challenges and the risks and opportunities that lie ahead. While it&#8217;s important to understand the technologies and mitigations that can help, it is equally important to look within and understand the relevance of those tools within your own security environment.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">5. Focusing On Culture<\/h3>\n<p>Security must be top of mind in employees. It should be their second nature; something that comes naturally to them whenever they are interacting online. The idea behind this is to leverage human intuition and reaction as a kind of human firewall, so that threats can be detected, reported and intercepted much earlier in their lifecycle, before they can infiltrate and cause damage.<\/p>\n<p>Having the right security technology is only one piece of the security puzzle. Having leadership that backs a security-oriented culture is a major piece, along with measuring security baselines, understanding the security context, staying current on threat intelligence and focusing on the human aspect of security.<\/p>\n<p>Forbes Business Council is the foremost growth and networking organization for business owners and leaders. <em data-ga-track=\"InternalLink:https:\/\/councils.forbes.com\/qualify?utm_source=forbes.com&amp;utm_medium=referral&amp;utm_campaign=forbes-links&amp;utm_term=fbc&amp;utm_content=in-article-ad-links\">Do I qualify?<\/em><\/p>\n<\/div>\n<p>Read the full article <a href=\"https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2023\/09\/27\/cybersecurity-mistakes-that-have-nothing-to-do-with-technology-and-how-companies-can-fix-them\/\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training &amp; Simulated Phishing platform. Today\u2019s organizations understand the importance of cybersecurity. They know cyberattacks and data breaches are frequent, more targeted and more dangerous. They recognize the risks of ransomware, the disruption it can cause and the damage it can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[77],"tags":[],"class_list":{"0":"post-15572","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-startups"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Five Cybersecurity Mistakes And How Companies Can Fix Them | Brandiary<\/title>\n<meta name=\"description\" content=\"Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training &amp; Simulated Phishing platform. Today\u2019s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mysourcefunding.com\/?p=15572\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Cybersecurity Mistakes And How Companies Can Fix Them | Brandiary\" \/>\n<meta property=\"og:description\" content=\"Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training &amp; Simulated Phishing platform. Today\u2019s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mysourcefunding.com\/?p=15572\" \/>\n<meta property=\"og:site_name\" content=\"Brandiary\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-28T05:24:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-28T05:24:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/09\/1695878654_0x0.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"News Room\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"News Room\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=15572#article\",\"isPartOf\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=15572\"},\"author\":{\"name\":\"News Room\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4\"},\"headline\":\"Five Cybersecurity Mistakes And How Companies Can Fix Them\",\"datePublished\":\"2023-09-28T05:24:13+00:00\",\"dateModified\":\"2023-09-28T05:24:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=15572\"},\"wordCount\":876,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mysourcefunding.com\/#organization\"},\"articleSection\":[\"Startups\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mysourcefunding.com\/?p=15572#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=15572\",\"url\":\"https:\/\/mysourcefunding.com\/?p=15572\",\"name\":\"Five Cybersecurity Mistakes And How Companies Can Fix Them | Brandiary\",\"isPartOf\":{\"@id\":\"https:\/\/mysourcefunding.com\/#website\"},\"datePublished\":\"2023-09-28T05:24:13+00:00\",\"dateModified\":\"2023-09-28T05:24:15+00:00\",\"description\":\"Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training &amp; Simulated Phishing platform. Today\u2019s\",\"breadcrumb\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=15572#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mysourcefunding.com\/?p=15572\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=15572#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mysourcefunding.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Cybersecurity Mistakes And How Companies Can Fix Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mysourcefunding.com\/#website\",\"url\":\"https:\/\/mysourcefunding.com\/\",\"name\":\"Brandiary\",\"description\":\"Latest Business and Startup News and Updates\",\"publisher\":{\"@id\":\"https:\/\/mysourcefunding.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mysourcefunding.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mysourcefunding.com\/#organization\",\"name\":\"Brandiary\",\"url\":\"https:\/\/mysourcefunding.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png\",\"contentUrl\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png\",\"width\":381,\"height\":100,\"caption\":\"Brandiary\"},\"image\":{\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4\",\"name\":\"News Room\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png\",\"contentUrl\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png\",\"caption\":\"News Room\"},\"sameAs\":[\"https:\/\/mysourcefunding.com\"],\"url\":\"https:\/\/mysourcefunding.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Cybersecurity Mistakes And How Companies Can Fix Them | Brandiary","description":"Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training &amp; Simulated Phishing platform. Today\u2019s","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mysourcefunding.com\/?p=15572","og_locale":"en_US","og_type":"article","og_title":"Five Cybersecurity Mistakes And How Companies Can Fix Them | Brandiary","og_description":"Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training &amp; Simulated Phishing platform. Today\u2019s","og_url":"https:\/\/mysourcefunding.com\/?p=15572","og_site_name":"Brandiary","article_published_time":"2023-09-28T05:24:13+00:00","article_modified_time":"2023-09-28T05:24:15+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/09\/1695878654_0x0.jpg","type":"image\/jpeg"}],"author":"News Room","twitter_card":"summary_large_image","twitter_misc":{"Written by":"News Room","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mysourcefunding.com\/?p=15572#article","isPartOf":{"@id":"https:\/\/mysourcefunding.com\/?p=15572"},"author":{"name":"News Room","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4"},"headline":"Five Cybersecurity Mistakes And How Companies Can Fix Them","datePublished":"2023-09-28T05:24:13+00:00","dateModified":"2023-09-28T05:24:15+00:00","mainEntityOfPage":{"@id":"https:\/\/mysourcefunding.com\/?p=15572"},"wordCount":876,"commentCount":0,"publisher":{"@id":"https:\/\/mysourcefunding.com\/#organization"},"articleSection":["Startups"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mysourcefunding.com\/?p=15572#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mysourcefunding.com\/?p=15572","url":"https:\/\/mysourcefunding.com\/?p=15572","name":"Five Cybersecurity Mistakes And How Companies Can Fix Them | Brandiary","isPartOf":{"@id":"https:\/\/mysourcefunding.com\/#website"},"datePublished":"2023-09-28T05:24:13+00:00","dateModified":"2023-09-28T05:24:15+00:00","description":"Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training &amp; Simulated Phishing platform. Today\u2019s","breadcrumb":{"@id":"https:\/\/mysourcefunding.com\/?p=15572#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mysourcefunding.com\/?p=15572"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mysourcefunding.com\/?p=15572#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mysourcefunding.com\/"},{"@type":"ListItem","position":2,"name":"Five Cybersecurity Mistakes And How Companies Can Fix Them"}]},{"@type":"WebSite","@id":"https:\/\/mysourcefunding.com\/#website","url":"https:\/\/mysourcefunding.com\/","name":"Brandiary","description":"Latest Business and Startup News and Updates","publisher":{"@id":"https:\/\/mysourcefunding.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mysourcefunding.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mysourcefunding.com\/#organization","name":"Brandiary","url":"https:\/\/mysourcefunding.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/","url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png","contentUrl":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png","width":381,"height":100,"caption":"Brandiary"},"image":{"@id":"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4","name":"News Room","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/image\/","url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png","contentUrl":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png","caption":"News Room"},"sameAs":["https:\/\/mysourcefunding.com"],"url":"https:\/\/mysourcefunding.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/15572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15572"}],"version-history":[{"count":1,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/15572\/revisions"}],"predecessor-version":[{"id":15574,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/15572\/revisions\/15574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/media\/15573"}],"wp:attachment":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}