fbpx
Size of letters 1x
Site color
Image
Additionally
Line height
Letter spacing
Font
Embedded items (videos, maps, etc.)
 

Workshop on Cybersecurity: How to lose business in 20 min?

19/ 04/ 2018
    “There are two types of companies: those who have been hacked, and those who dont yet know theyve been hacked”. John Chambers, Chief Executive Officer of Cisco Yesterday (April 19) took place a lively meeting with two experts on cybersecurity Roman Trukhin and Mykhailo Horbych, representatives of UnderDefense company. Our speakers stressed the importance of people, processes and technologies for cybersecurity. Based on their own experience Roman and Mykhailo stated that employees are the largest security vulnerability in any company, especially if no prior trainings, testing and explanations on security were made. Company can invest in the most expensive antivirus software and protected servers, introduce a two-level authorization and use complicated passwords, however, none of the enlisted above preventive measures will work, should one of the employees “inserts his/her personal memory card into computer and affect the whole system with a virus”. Roman and Mykhailo presented detailed explanation of possible threats and solutions. They also confuted an argument “who needs my data?” and encouraged company executives for precise selection of those, whom they trust company data. Threat can come from anywhere. Any company regardless of its size can be a victim of cyberattacks, and for a small company this could be a way to bankruptcy. It is worth to keep in mind that threats could be both external and internal. The most dangerous outcome of data loss could be the fact that these data might end up in hands of an intruder without any possibility to restore data. Cybersecurity should be a continues process, and not a one-off activity. As a conclusion to this meeting, we would like you to take a thought on “How much will cost a waiting time, restoring of data and loss of even one of your clients for your business?” Is it worth considering some cybersecurity provisional measures by making these simple calculations? We are thankful to Roman and Mykhailo for such a qualitative approach and all the precautions shared with the participants. A special thank you to Advice Group for warm welcome, friendly atmosphere and delicious refreshments.
01/

 

“There are two types of companies: those who have been hacked, and those who don’t yet know they’ve been hacked”.

John Chambers, Chief Executive Officer of Cisco

Yesterday (April 19) took place a lively meeting with two experts on cybersecurity Roman Trukhin and Mykhailo Horbych, representatives of UnderDefense company.

Our speakers stressed the importance of people, processes and technologies for cybersecurity.

Based on their own experience Roman and Mykhailo stated that employees are the largest security vulnerability in any company, especially if no prior trainings, testing and explanations on security were made. Company can invest in the most expensive antivirus software and protected servers, introduce a two-level authorization and use complicated passwords, however, none of the enlisted above preventive measures will work, should one of the employees “inserts his/her personal memory card into computer and affect the whole system with a virus”.

Roman and Mykhailo presented detailed explanation of possible threats and solutions. They also confuted an argument “who needs my data?” and encouraged company executives for precise selection of those, whom they trust company data. Threat can come from anywhere. Any company regardless of its size can be a victim of cyberattacks, and for a small company this could be a way to bankruptcy.

It is worth to keep in mind that threats could be both external and internal. The most dangerous outcome of data loss could be the fact that these data might end up in hands of an intruder without any possibility to restore data. Cybersecurity should be a continues process, and not a one-off activity.

As a conclusion to this meeting, we would like you to take a thought on “How much will cost a waiting time, restoring of data and loss of even one of your clients for your business?” Is it worth considering some cybersecurity provisional measures by making these simple calculations?

We are thankful to Roman and Mykhailo for such a qualitative approach and all the precautions shared with the participants. A special thank you to Advice Group for warm welcome, friendly atmosphere and delicious refreshments.

Partners

If you have found a spelling error, please, notify us by selecting that text and pressing Ctrl+Enter.

Start
in the Telegram bot
Read articles. Share in social networks

Spelling error report

The following text will be sent to our editors: