HomeCyber BalkansThe Cybersecurity Bridge: A Vital Link for IT and Communications

The Cybersecurity Bridge: A Vital Link for IT and Communications

Published on

spot_img
The Cybersecurity Bridge: A Vital Link for IT and Communications

As the threat of cybercrime continues to rise, it is becoming increasingly important for companies to prioritize cybersecurity and ensure that their IT and communications departments are aligned in their efforts to protect client information and stakeholders from potential negative impacts.

According to Statista, the global estimated cost of cybercrime is forecasted to increase by $5.7 trillion between 2023 and 2028. By 2028, the cost of cybercrime worldwide is estimated to exceed $13.82 trillion. These staggering figures highlight the growing need for organizations to take proactive measures to protect themselves from cyber threats.

To gain insight into the current disconnect between IT and communications departments when it comes to prioritizing cybersecurity, Hahn and Silent Quadrant conducted interviews with senior-level communication executives and IT professionals across the U.S. The findings revealed that the current level of cyber attack preparedness is low, with unclear implementation. While most IT respondents had a rapid response plan in place, they often did not know how or who was responsible for communicating it to other departments. Similarly, many communications executives admitted to never having seen a rapid response plan, or if they had, they found it to be confusing.

In terms of prioritization, cybersecurity ranked fifth out of eight items overall for the participants. This indicates that many companies are prioritizing other goals over cybersecurity, such as client satisfaction and business growth. However, the majority of participants agreed that cybersecurity should be a higher priority due to its potential to affect core business operations.

The study also found that many companies handle cyber attacks internally until external resources are needed. When considering whether to bring in an external vendor, IT departments focus on expertise and certifications, while communications departments focus on confidentiality. Smaller companies that may lack the necessary expertise in-house are more likely to hire an external vendor.

To address these challenges, the authors proposed three key solutions for bridging the cybersecurity gap between IT and communications departments. The first solution is to build a cyber-aware culture within the organization. This involves appointing a Chief Information Security Officer to oversee cybersecurity initiatives and ensure that they are communicated throughout the organization. Additionally, ongoing training for employees can help them recognize and respond to potential threats.

The second solution is to build a joint cyber rapid response plan with regular updating and testing. Cybersecurity is an ongoing investment that requires time and funds for regular updates and maintenance. By adopting a comprehensive cybersecurity framework and conducting rapid response workshops, companies can build a functional plan to respond to cyber attacks.

The third solution is to develop an effective method to communicate the plan to all stakeholders. This involves removing technical jargon from the plan to ensure that everyone understands their roles and responsibilities in the event of a cyber attack.

In conclusion, the increasing prevalence of cybercrime necessitates a more cohesive approach to cybersecurity within organizations. By aligning IT and communications departments and implementing the proposed solutions, companies can better protect themselves from the growing threat of cyber attacks.

Jeff Hahn is the principal of Hahn, an Austin-based predictive marketing firm, and author of Breaking Bad News. He can be reached on LinkedIn or by email at jeff.hahn@hahn.agency.

Kenneth Holley is the principal and chairman of Silent Quadrant, a digital protection agency. He founded Silent Quadrant in 1993 and has assisted numerous clients in ensuring brand and profile security. He can be reached through the Silent Quadrant website, LinkedIn, or by email at kenneth@silentquadrant.com.

Source link

Latest articles

Ketchikan Borough recovers $625k stolen by email hacker

The Ketchikan Gateway Borough has recently made a significant recovery after falling victim to...

Ukraine Hackers Target Major Russian Banks with DDoS Attacks

Several major Russian banks faced technical issues with their mobile apps and websites, causing...

Millions of Devices at Risk of ‘PKFail’ Secure Boot Bypass Vulnerability

A critical security flaw in the Secure Boot process has been discovered, allowing attackers...

AI-Powered Cybercrime Service: Phishing Kits Bundled with Malicious Android Apps

In a recent development in the realm of cybercrimes, a Spanish-speaking cybercrime group known...

More like this

Ketchikan Borough recovers $625k stolen by email hacker

The Ketchikan Gateway Borough has recently made a significant recovery after falling victim to...

Ukraine Hackers Target Major Russian Banks with DDoS Attacks

Several major Russian banks faced technical issues with their mobile apps and websites, causing...

Millions of Devices at Risk of ‘PKFail’ Secure Boot Bypass Vulnerability

A critical security flaw in the Secure Boot process has been discovered, allowing attackers...
en_USEnglish