In the past decade, we have witnessed the increasing amount of data that can be heard, accessed, downloaded and captured through internet devices. However, such efficiency has come at the expense of security, since whatever is said or done online can be traced, shared and archived.

The recent controversy over naked selfies is a good example, when a photo that was shared in confidence was passed on to third parties and became viral. Now that is just one instance. Scale it to a corporate level, and the implications of mishandling data could be catastrophic.

The risks to businesses in terms of data sharing, leakage and theft are critical and no business can remain passive in its approach to cyber security.

Joseph Borg, senior developer at a local digital creative agency tells me how, “Nowadays, a CEO’s attitude towards a potential cyber threat is an absolute priority. It is no longer an issue for IT departments alone.”

Hence, cyber security readiness should be at the forefront of any business’s agenda.

Cyber security readiness is the ability to respond and recover quickly from a cyber threat or attack, such as distributed denial-of-service attacks or trojans. This should be considered as part of every business continuity plan, which enables businesses of any size to be prepared for any potential threats or disasters that could harm their online systems.

The first step is to know your business and to understand its potential threats. These incidents or potential disasters would differ according to a company’s size and the kind of sector in which it operates. Nonetheless, a threat prevents your system from functioning properly, further increasing your company’s chances of becoming vulnerable.

So in this context, cyber security readiness is a call for action, a means of being constantly prepared to face up to any possible flaws that could endanger your systems.

“I believe that the most basic threat to security is lack of awareness and misinformed individuals. The most common mistake, for instance, is putting your surname or date of birth in your password,” adds Mr Borg.

Whereas in the past, many tasks where done by hand and people had to physically break into an office to steal a document, today those tasks are carried out online and accessible from anywhere. That is why passwords and system security can no longer be taken lightly, because confidential data is no longer locked away in a drawer.

“You’d be amazed how much information is stored in an employee’s e-mail account, and how much of this information could be valuable to a company’s competitors. It might sound trivial, until you start thinking about it,” says Mr Borg.

Cyber attacks occur when an individual or an organisation of hackers target your vulnerable system and steals, alters or destroys your data while remaining anonymous.

“It all depends on the business sector and the size of your company,” Mr Borg says. “If we had to consider a mini-market or grocer, having a backup of your files would suffice. A small business owner wouldn’t need to spend so much on cyber security because the risks are minimal when compared to larger businesses.”

Last April, thousands of web and e-mail servers worldwide showed signs of a software flaw that allowed attackers to steal the cryptographic keys used to secure online commerce and web connections. The Heartbleed bug, as it was called, affected web servers running a package called OpenSSL, which could leak personal information to hackers when people carried out searches or logged into their e-mail account.

The vulnerability was also found in machines that transmit secure information, such as Facebook and Gmail. That is why it many companies and social networking website sent out e-mails, asking their employees and subscribers to change their passwords as a preventive measure.

Mr Borg explains that when it comes to cyber security readiness, one must distinguish between prevention and crisis control.

“Having a strong password and changing it regularly is a good means to prevent cyber attacks,” he explains.

“In terms of crisis control, I would say having a backup is always a good measure. Employees must be aware of such threats and be taught how to take necessary precautions: update your anti-virus software, keep a backup of your work and respect confidentiality.”

You’d be amazed how much information isstored in an employee’s e-mail account

However, the ideal situation is to always be prepared and to believe that your system is always at risk. “The difference in levels of preparedness tends to be related to the attitude one holds towards such threats,” says Mr Borg.

In fact, your system can never be foolproof. You can be taking all the necessary precautions and it may still not be enough: your systems are only as strong as their weakest link.

Bring Your Own Device initiatives, which are being increasingly implemented in workplaces, encourage those working in administration to bring their own tablets or laptops to work. Some NGOs are offering a subsidy for those employees working in administration who wish to buy a new laptop or tablet. This initiative sounds good on paper, however they multiply the risk of abuse and attack since the expansion of employee owned devices are exposed to a myriad of internal and external threats.

“BYOD seems to introduce a new level of threat and would require heavy backing of security initiatives. When a computer is left at an office it is less likely to be lost of stolen. When it’s carried around, you’re also bringing confidential information out in the open.”

Cyber security standards are now being created and pushed by governments due to all the sensitive information stored on our devices. In fact, last March, the European Parliament voted in favour of the Network and Information Security (NIS) directive on cyber security with an overwhelming majority. Neelie Kroes, the Commissioner responsible for the EU’s Digital Agenda said that her ambition is to make Europe the world’s safest online space.

“Let’s work together to show that governments and law makers are part of the solution to online trust not part of the problem,” she said. If people’s confidence in buying things online and using the internet will be strengthened, this will lead to economic growth.

Christine Spiteri has specialised in media culture at Maastricht University, the Netherlands.

Sign up to our free newsletters

Get the best updates straight to your inbox:
Please select at least one mailing list.

You can unsubscribe at any time by clicking the link in the footer of our emails. We use Mailchimp as our marketing platform. By subscribing, you acknowledge that your information will be transferred to Mailchimp for processing.