HomeCyber BalkansThe Cybersecurity Bridge: A Vital Link for IT and Communications

The Cybersecurity Bridge: A Vital Link for IT and Communications

Published on

spot_img

As the threat of cybercrime continues to rise, it is becoming increasingly important for companies to prioritize cybersecurity and ensure that their IT and communications departments are aligned in their efforts to protect client information and stakeholders from potential negative impacts.

According to Statista, the global estimated cost of cybercrime is forecasted to increase by $5.7 trillion between 2023 and 2028. By 2028, the cost of cybercrime worldwide is estimated to exceed $13.82 trillion. These staggering figures highlight the growing need for organizations to take proactive measures to protect themselves from cyber threats.

To gain insight into the current disconnect between IT and communications departments when it comes to prioritizing cybersecurity, Hahn and Silent Quadrant conducted interviews with senior-level communication executives and IT professionals across the U.S. The findings revealed that the current level of cyber attack preparedness is low, with unclear implementation. While most IT respondents had a rapid response plan in place, they often did not know how or who was responsible for communicating it to other departments. Similarly, many communications executives admitted to never having seen a rapid response plan, or if they had, they found it to be confusing.

In terms of prioritization, cybersecurity ranked fifth out of eight items overall for the participants. This indicates that many companies are prioritizing other goals over cybersecurity, such as client satisfaction and business growth. However, the majority of participants agreed that cybersecurity should be a higher priority due to its potential to affect core business operations.

The study also found that many companies handle cyber attacks internally until external resources are needed. When considering whether to bring in an external vendor, IT departments focus on expertise and certifications, while communications departments focus on confidentiality. Smaller companies that may lack the necessary expertise in-house are more likely to hire an external vendor.

To address these challenges, the authors proposed three key solutions for bridging the cybersecurity gap between IT and communications departments. The first solution is to build a cyber-aware culture within the organization. This involves appointing a Chief Information Security Officer to oversee cybersecurity initiatives and ensure that they are communicated throughout the organization. Additionally, ongoing training for employees can help them recognize and respond to potential threats.

The second solution is to build a joint cyber rapid response plan with regular updating and testing. Cybersecurity is an ongoing investment that requires time and funds for regular updates and maintenance. By adopting a comprehensive cybersecurity framework and conducting rapid response workshops, companies can build a functional plan to respond to cyber attacks.

The third solution is to develop an effective method to communicate the plan to all stakeholders. This involves removing technical jargon from the plan to ensure that everyone understands their roles and responsibilities in the event of a cyber attack.

In conclusion, the increasing prevalence of cybercrime necessitates a more cohesive approach to cybersecurity within organizations. By aligning IT and communications departments and implementing the proposed solutions, companies can better protect themselves from the growing threat of cyber attacks.

Jeff Hahn is the principal of Hahn, an Austin-based predictive marketing firm, and author of Breaking Bad News. He can be reached on LinkedIn or by email at jeff.hahn@hahn.agency.

Kenneth Holley is the principal and chairman of Silent Quadrant, a digital protection agency. He founded Silent Quadrant in 1993 and has assisted numerous clients in ensuring brand and profile security. He can be reached through the Silent Quadrant website, LinkedIn, or by email at kenneth@silentquadrant.com.

Source link

Latest articles

Cyber Threat Assessment from securityboulevard.com

systems from cyber threats. By actively engaging in cyber threat assessments and implementing the...

Trillions at Stake as Global Threats Soar, ANZ’s Security Chief Warns

In the face of the escalating global threat posed by cybercrime, industry experts like...

African Infrastructure Cyberattacks and AI-Powered Threats Increase

In 2023, a noticeable decrease in cyber threats was observed in most major economies...

We belong: Q&A with Miriam Saffer – Creative, pragmatic, and resilient.

MIriam Saffer: about being judged or not believed. If an employee trusts you enough...

More like this

Cyber Threat Assessment from securityboulevard.com

systems from cyber threats. By actively engaging in cyber threat assessments and implementing the...

Trillions at Stake as Global Threats Soar, ANZ’s Security Chief Warns

In the face of the escalating global threat posed by cybercrime, industry experts like...

African Infrastructure Cyberattacks and AI-Powered Threats Increase

In 2023, a noticeable decrease in cyber threats was observed in most major economies...
en_USEnglish