LACyber: Cyber Security Blog

cyber security buffalo western new york
a division of Lincoln Archives Inc.

Creating an Effective Cyber Defense Strategy

by Sally Rozumalski

The current rate of cyber-attacks in the United States is steadily on the rise, with leading experts in the field of Information Security, forecasting a massive cyber security breach in the near future. A breach of this caliber would put sensitive information at risk and indefinitely provoke severe damage to current defense practices. More than ever, it’s imperative to be prepared, and have a defense strategy in place. Any business, regardless of size, would be taking an extreme risk to their data, employees and future if the necessary precautions are not put into place.

Why it’s important

The monumental damage caused by a security breach can be astounding, as we have seen from high-profile leaks across the globe, from Marriott to Yahoo and even the GOP. When developing a strategy, you must be able to properly assess the amount of overall damage that your business individually could suffer. Unfortunately, there is no “one size fits all” strategy. With new legislation on the table including New York’s SHIELD Act, or California’s Consumer Privacy Act of 2018, AB 375 (similar to the European General Data Protection Regulations) going into effect in 2020, businesses of all sizes must work to reach or maintain compliance and avoid security leaks at all costs.


Build A Strategy

When it comes to developing a cybersecurity strategy, there are 5 key questions we must consider:

  1. Are you keeping your client’s best interest in mind when it comes to securing their data?
  2. How easy would it be to access your company and clients’ sensitive information?
  3. How do you prioritize risks?
  4. How do you plan to respond in the chance you experience a breach?
  5. If a data breach occurs, how much damage would really impact your customers?


The biggest takeaway to keep in mind, is the risk. Risk is directly associated with the potential amount of damage that an attacker could inflict with your customers’ data. Image is also a huge topic of interest to your company due to negligence or noncompliance. The perception alone of an insecure network can do as much damage to a brand and or company as a legitimate security breach.

Many small businesses underestimate the sheer amount of information that they have in their possession. These businesses will further struggle in coming years as the push to convert to cloud-computing is only adding to the complexity of properly securing sensitive information. The more these companies are using cloud-based services to record transactions, financial data, personal preferences, search histories and medical records, the more serious a security breach will be.


Reaching and Maintaining Compliance

A single gap in coverage can bring down even the largest and most powerful of companies. Once a consumer loses trust of the company they are working with, it is next to Impossible to regain it. With this in mind, companies of all sizes need to take the necessary steps to not only be compliant with legislation, but also be proactive in developing systems that can defend themselves from claims of negligence.

Small businesses take center stage in regulations such as SHIELD and CCPA. With legislation like these becoming more commonplace, a lack of resources and education could become a serious issue. Since having an online presence and customer database is essentially required for any business today, many smaller operations either do not have the available resources to become compliant, and many are unaware that their business would require changes due to new regulations.

So, options? What can an organization do if they don't currently have a cybersecurity strategy or do not have an in-house team? There’re many steps to take! First, remember the initial 5 questions! Then begin to focus on:

What needs are the most apparent?

What are the risks of a data breach for you?

What type of information are you collecting?

Who has access to client data?

Remember, one size does not fit all in the world of cybersecurity! Determining potential vulnerabilities is different for every business, and will vary in depth and detail depending on the type, quantity, and security of information that is associated with the business. Regardless of the scope of industry, size or revenue, a cyber security strategy is absolutely required in 2019. The freer information flows across the digital landscape, the more vulnerable we become to cyberattacks. We create vulnerabilities which entail makes more stringent regulations. Businesses and organizations will need all the help they can get to ensure data security and compliance with future regulations in 2019 and the years ahead.

LACyber is a division of Lincoln Archives providing comprehensive Data Breach Defense Services. Lincoln Archives and LACyber are proud to be a part of Lincoln Family of Companies serving the Western New York Community since 1914.


Return to Blog Menu

Contact Information:

155 Great Arrow
Buffalo, New York
(716) 871-7040

Recent Blog Posts:

The SHIELD Act has passed… Now what?
New York state has a new law! This will drastically change our approach to data breaches, what signifies a breach and who must report, while also imposing more stringent penalties on companies for cyber security incidents! Are you prepared?
Author: Sally Rozumalski - Date: 2019-07-24
Is Tape Back Up Still Relevant?
As the years go on, tape is not going away. In fact, the technology behind tapes is improving! The question is: are there enough discussions taking place about this data back-up method?
Author: Sally Rozumalski - Date: 2019-06-13
Data Destruction, What is the Big Deal?
Ensuring the secure destruction of private data not only gives you piece of mind, but also could potentially save you thousands if not millions of dollars in data breach fines.
Author: Sally Rozumalski - Date: 2019-04-19
Can Your Smart Speaker "Hear" You?
Millions of people turn to their smart home devices for the weather, music or just a good laugh. But do you ever wonder if your smart device can actually hear whats being said, or where that information might go?
Author: Kathryn Turner - Date: 2019-04-12
The Gap in Risk Protection You Won’t See Coming
Your office network is a complex compilation of interconnected machines which cyber criminals seek to break into. So what part of your office is the most vulnerable to a data breach?
Author: Sally Rozumalski - Date: 2019-04-05
See All Blog Posts

Contact Form

Cyber Defense Plans starting at $49.99