5 BEST PRACTICES TO BUILD CYBERSECURITY RESILIENCE.

THE REMOTE AND HYBRID WORKFORCE has expanded dramatically over the past two-plus years--with the number of employees working from home increasing at a rapid rate. But as businesses have adjusted to support a remote or hybrid workforce, cyberthreats continue to be a persistent and complex problem.

Comcast Business knows first-hand that the security landscape remains challenging. While this year has seen a number of high-profile cyberattacks, attackers don't discriminate by size. Like their larger counterparts, small businesses have valuable data and financial resources that threat actors often target. In fact, more than half of small businesses have suffered at least one security incident, according to Identity Theft Resource Center's 2021 Business Aftermath Report.

Fortunately, research indicates that organizations are investing in cybersecurity to address the challenges of protecting against a growing threat profile and in remote or hybrid IT operations to support an expanded workforce. Many businesses have also found that having good security solutions in place not only protects from threats and breaches, which could be costly due to outages and remediation, but helps their brand stand out.

One such cybersecurity solution is Comcast Business SecurityEdge[TM], which helps protect users and all their connected devices against threats such as malware, ransomware, phishing and botnets. Over the past year, SecurityEdge blocked tens of millions of threats and helped protect tens of thousands of small businesses. SecurityEdge also comes with a 24/7 customer service line if businesses come across an issue, plus it features advanced global threat intelligence powered by Akamai and is updated every five minutes.

Just in time for Cybersecurity Awareness Month, Comcast Business has shared the following best practices that when coupled with a comprehensive security solution, businesses can implement to build their cybersecurity resilience:

  1. Know the cloud footprint. The use of cloud resources is very convenient, but oftentimes when a campaign is over, organizations forget to disable the application, which means it's still available and could be an outlet to threat. It's important that organizations are aware of their cloud footprint to ensure unused applications are removed. This added level of scrutiny and validation ensures businesses and customers aren't vulnerable to leaky, unused cloud apps that could cause a potential customer data breach.

  2. ...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT