The 3 P’s of Cybersecurity—How to Put These Basic Fundamentals to Work for Your Business (2024)

The 3 P’s of Cybersecurity—How to Put These Basic Fundamentals to Work for Your Business (1)

Last week, Bob Lord, Chief Information Security Officer at Yahoo, headlined a panel at SXSW in Austin, TX, entitled The New Normal: User Security in an Insecure World.

Instead of focusing solely on the threats presented by this terrifying cybersecurity world we live in (see the massive Russian intelligence-directed hack on Yahoo, which compromised 500 million user accounts in 2014), Lord also presented a positive message: three crucial principles that can lead to a healthy cybersecurity environment. After all, as security experts the world over reiterate time and again, understanding cybersecurity risks isn’t the same as protecting against them.

The beauty of Lord’s presentation came in its simplicity, which focused on three P’s that can protect business data, prevent a ransomware attack, and increase productivity:

  • Patches
  • Passwords
  • Phishing

Now, for a little more detail on each bullet:

1) Patches—Whether it’s for your operating system, your suite of Microsoft Office applications, or just your favorite smartphone app, security patches (otherwise known as software updates) ensure critical protection against evolving cybercrime trends. But sometimes the delivery mechanism for those updates can be confusing, leading to users either neglecting important downloads, installing patches that aren’t necessary or securely vetted, or even disrupting normal operations with an ill-timed click of that “Install Now” button. That’s where the guidance of a trusted IT provider comes in. A good cybersecurity expert like CMIT Solutions takes a proactive as opposed to a reactive approach to IT support, fixing problems before they occur, monitoring and maintaining systems 24/7, and only installing patches and updates when they’re safe to deploy and convenient for employees.

2) Passwords—Speaking of that aforementioned Yahoo hack, which resulted in the federal indictment of Russian hackers last week…Details from the Department of Justice’s investigation revealed that the hackers didn’t have to try hard to perpetrate their cybercrime. According to the indictment, the Russian hackers searched email accounts and online messaging apps for keywords like “password123” to find people’s login credentials, many of which were used for multiple accounts. That’s why it’s so important to not reuse the same password across multiple platforms; to create strong, long passwords comprised of random letters, numbers, and characters (think “th1sisn0tmyp@sswOrd” instead of “thisisnotmypassword”); to activate two-factor authentication whenever and wherever it’s available; and to go the extra mile with enterprise-level password management solutions.

3) Phishing—Aside from brute-force attacks by shadowy hackers, the next biggest and often most insidious form of cybercrime comes via phishing. Defined as an email sent out from a domain address that looks legitimate (think “mycompaany.com” instead of “mycompany.com”) containing links or attachments that also appear to be valid, phishing has become the #1 delivery method for ransomware and malware. Recipients of the carefully crafted and often harmless-looking emails are guided to click on a bogus link or download a malicious file, which when opened can access and often encrypt all of the data on your computer and any connected networks. That’s why it’s so important to empower employees with targeted training to identify phishing emails, to regularly and remotely back up all critical data in case of infection, and to know what to do if you fall victim to an attack (hint: don’t pay the ransom!).

No matter what your level of cybersecurity knowledge and experience, understanding these critical three P’s (patches, passwords, phishing) can help lead to comprehensive protection. The other most important component? Having a trusted IT provider like CMIT Solutions in your corner putting those three P’s into action. We worry about cybersecurity so you don’t have to, freeing you up to run your business and deliver the best customer service on the planet while we make sure all computers and technology systems run smoothly. Contact us today to learn more.

Back to Blog

Share:

Related Posts

15 Quick Keyboard Shortcuts to Supercharge Your Use of Microsoft Office

In late 2013 and early 2014, CMIT Solutions covered 10 tricks, tips,…

Read More

Personal Data at Risk if You Don’t Wipe Your Old Mobile Device

Over the last 12 months, the four largest mobile carriers in the…

Read More

Who Can You Trust with Your Information? Recent Poll Says Not Many Institutions

No technology trend has been more ubiquitous lately than online security (or…

Read More

The 3 P’s of Cybersecurity—How to Put These Basic Fundamentals to Work for Your Business (2024)
Top Articles
8 Ineffective Management Styles to Root Out of Your Organization
How To Open A Bank Account Online: Your Complete Step-By-Step Guide
Danielle Moodie-Mills Net Worth
Blanchard St Denis Funeral Home Obituaries
Health Benefits of Guava
Gabrielle Abbate Obituary
Gameday Red Sox
Hay day: Top 6 tips, tricks, and cheats to save cash and grow your farm fast!
Shuiby aslam - ForeverMissed.com Online Memorials
MindWare : Customer Reviews : Hocus Pocus Magic Show Kit
Uhcs Patient Wallet
Vcuapi
National Office Liquidators Llc
White Pages Corpus Christi
Hyvee Workday
BMW K1600GT (2017-on) Review | Speed, Specs & Prices
Conan Exiles Sorcery Guide – How To Learn, Cast & Unlock Spells
Craigslistodessa
Koninklijk Theater Tuschinski
§ 855 BGB - Besitzdiener - Gesetze
Speedstepper
Harrison 911 Cad Log
R/Mp5
Nikki Catsouras: The Tragic Story Behind The Face And Body Images
Clearvue Eye Care Nyc
Sun Haven Pufferfish
What Time Does Walmart Auto Center Open
Litter-Robot 3 Pinch Contact & DFI Kit
Junior / medior handhaver openbare ruimte (BOA) - Gemeente Leiden
Why The Boogeyman Is Rated PG-13
Best Workers Compensation Lawyer Hill & Moin
The 38 Best Restaurants in Montreal
Afspraak inzien
Bbc Gahuzamiryango Live
Tirage Rapid Georgia
Craigslist Tulsa Ok Farm And Garden
PruittHealth hiring Certified Nursing Assistant - Third Shift in Augusta, GA | LinkedIn
Thelemagick Library - The New Comment to Liber AL vel Legis
Academy Sports New Bern Nc Coupons
Mugshots Journal Star
Autum Catholic Store
Citibank Branch Locations In North Carolina
Searsport Maine Tide Chart
Dlnet Deltanet
Verizon Forum Gac Family
Zadruga Elita 7 Live - Zadruga Elita 8 Uživo HD Emitirani Sat Putem Interneta
How to Do a Photoshoot in BitLife - Playbite
Home | General Store and Gas Station | Cressman's General Store | California
Pulpo Yonke Houston Tx
Dinargurus
Latest Posts
Article information

Author: Zonia Mosciski DO

Last Updated:

Views: 6311

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Zonia Mosciski DO

Birthday: 1996-05-16

Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

Phone: +2613987384138

Job: Chief Retail Officer

Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.