We use cookies to improve your experience and optimize user-friendliness. Read our privacy policy for more information on the cookies we use and how to delete or block them. To continue browsing our site, please click accept.
Winning Back-Office Strategies to Boost Your Business Agility
VIEWpoint Issue 1 | 2023
2023 Compliance Trends: Staying Ahead in an Evolving Regulatory E...
By John Hock, CPA, CISA, CITP, SOC – Manager, IT Advisory and Security Group
As the frequency and sophistication of cyberattacks increase by the year, a company’s best defense against this prevalent threat is teamwork. Rather than limiting security precautions to a designated team of specialized information technology (IT) personnel, the organization should call on each employee – regardless of function – to actively participate in the defense against cybercrime.
An effective cybersecurity program may only be achieved when each employee takes proper action to protect against cybercrime. The role and actions each employee takes to help will be dependent on their function and set of responsibilities within an organization. Explore the different functions of a business and the common role they can play in creating a cyber-secure culture.
Leadership, Planning and Governance
Those who control the strategic direction of the organization are responsible for understanding and mitigating the overall cyber-related risks to the organization. Setting the tone from the top for a cyber-secure culture will be important to be successful.
What they should do:
Sales, Marketing and Communications
Because these teams are engaging with clients, prospects and vendors outside of the organization, they need to focus on preventing information loss during these interactions, in addition to protecting the organization’s brand and reputation.
What they should do:
Facilities, Physical Systems and Operations
Employees who design and deliver the organization’s products and services have an obligation to protect the uniqueness of these products and services, as well as securing their physical systems from both physical and cyber hazards.
What they should do:
Finance and Administration
The finance and administration team handles a lot of sensitive information, from payroll to banking, and they must ensure that this information stays secure in compliance with corporate policy, while helping the organization maintain its financial health.
What they should do:
Human Resources
Those who hire and support an organization’s employees can contribute to a cyber-secure culture by executing best practices in employee training, performance management and record keeping.
What they should do:
Legal and Compliance
Employees who take on legal and compliance matters ensure the organization is meeting all cybersecurity laws and regulations to mitigate liabilities. When incidents do arise, they address the legal implications.
What they should do:
Information Technology
At the heart of any cyber-secure organization is a good IT team. Tasked with helping develop and maintain company technology and security, the team must have the relevant expertise to contribute in implementing a multi-layered approach to the information security.
What they should do:
Although each employee plays a unique role in keeping an organization protected from cybercrime, there are a few simple steps every employee can take to contribute to a cyber-secure environment.
Familiarize yourself with technology policies and procedures. Be sure to read and understand the organization’s policies and procedures as it relates to technology and cybersecurity.
Keep your operating system updated. Enable automatic updates to ensure operating systems and applications are always at their most current, secure version.
Protect files and sensitive information protected. Share only necessary information, use strong passwords and secure files when your transferring them to others.
Be vigilant. Stay watchful and be vigilant for potential security risks and speak up if you notice anything unusual.
Work securely when remote. Optimize your security when out of the office by taking measures like maximizing encryption levels on your wireless router, increasing security settings on your browser and using a Virtual Private Network (VPN) to access corporate networks. Do not use public Wi-Fi without a VPN.
Today, employees are the greatest vulnerability to any organization’s cybersecurity program. Do you know if each of your employees is doing their part to protect the organization? Consider engaging a team of cybersecurity advisors, like those at Doeren Mayhew, to help you answer that question. Through Doeren Mayhew’s suite of CYBERCLAW™ solutions, our advisors can perform a variety of phishing exercises to determine your organization’s weakest links, along with many other assessments to help you identify risks to your systems and data. Contact our cybersecurity advisors today.
This publication is distributed for informational purposes only, with the understanding that Doeren Mayhew is not rendering legal, accounting, or other professional opinions on specific facts for matters, and, accordingly, assumes no liability whatsoever in connection with its use. Should the reader have any questions regarding any of the news articles, it is recommended that a Doeren Mayhew representative be contacted.
A quick registration is required to view our resources.
You will only be asked to do this one time (unless you don't save your browser cookies).