Skip to the main content.

3 min read

Introducing On Time Tech's Core Cybersecurity Services

Introducing On Time Tech's Core Cybersecurity Services

Over the past 14 years, the average total cost per data breach has increased from $3.54 million in 2006 to $8.19 million in 2019. Security should be an important component of your business. Hackers and cybercriminals are doing more than locking data in your company’s systems. They now steal information from your company, make copies of it and sell it.

Why Should San Francisco Businesses Care About Security?

Imagine that all of your company data is gone or posted on the internet overnight. Your files could be erased, copied, or destroyed. Your data could be stolen for ransom. These scenarios are real. They can result in ruined reputations, reduced productivity from downtime, and lost revenue.

What Are You Protecting?

Your business can be responsible for protecting a variety of information. For example, you are protecting your Personal Identifiable Information (PII). PII is information like credit card numbers, bank information, or health and personal information. You are also responsible for protecting the PII of your clients, including their banking information and data like email addresses. Lastly, your business has to protect accounting and human resource information, files, databases, and client lists with proprietary information.

What is Cybercrime?

Cybercrime is a complex, well-organized criminal endeavor with multiple participants. It is a growing industry where millions of dollars are made every day. Cybercrime can even be state-sponsored, usually by countries that oppose American views. Companies often do not publicly announce when they are the victims of cybercrime because they fear fallout. Most cybercrime occurs offshore, making it difficult, if not impossible, to stop.

Cybercrime happens frequently. The FBI’s Internet Crime Complaint Center began receiving 3,000 to 4,000 daily cybersecurity complaints shortly after the beginning of the global pandemic in 2020. There are different types of cybercrime, including ransomware, spear phishing, inside theft, wire fraud, physical theft, and denial of service. These different types of cybercrime all have different levels of likelihood of occurring and can have varying levels of impact on your business.

How Prevalent is Cybercrime?

Cybercrime is everywhere. Industry estimates predict that cybercrime could cost $6 trillion by 2021. Cybercrime is more profitable than the global trade of all major illegal drugs combined. Because of these shocking statistics, companies doubled the amount of money spent on security in 2019. Over 3.5 million people are predicted to work in cybercrime by 2021. Ransomware attacks are growing more than 350% annually.

How Do You Fight Cybercrime?

NIST Approach With Layers of Security

  • Identify: The first layer of security is identification. You must look at asset management by identifying all network devices, including hardware and software. Governance and policy procedure should be in place and openly discussed. These include acceptable use policies, remote access, social media, cell phone usage, and wire transfer. Companies should have and review cyber liability insurance plans as well as errors and ommissions plans. Think proactively to secure your company.
  • Protect: The second layer of security is protection. There are many available methods to protect data. These include firewalls, Office 365 Geo-Blocking, endpoint security Microsoft ATP, two-factor authentication, and software patches to protect from known vulnerabilities. Engage your employees with security awareness training. Often, people can be the weakest link, leading to 95% of all breaches. Your company should also consider disabling outlook web access and prohibit remote access using VPN without two-factor authentication.
  • Detect: The third layer in security protection is the detection of anomalies and events. SOC (Security Operations Center) focuses on looking for open ports, footholds, and ransomware detection. These operations should be performed on a 24/7 basis. DNS blocking and content blocking prohibit malware from calling back to their home. Finally, the dark web should be constantly monitored. Optional enhanced security features include creating a security policy, an incident response plan, and insurance review or Security Information Event Management (SIEM), DLP, and protection for personal computers.

Free NIST Cybersecurity Risk Assessment

We offer one free NIST risk assessment for every client to let each client know where they are protecting their information.

Ready to review your current security plan or need help developing one, contact On Time Tech at 415-294-5250 or 877-270-1391 for more information. We can guide you in purchasing a core security plan and have the knowledge to help you protect your work and reputation and prevent loss of revenue.

Microsoft Teams Pro Tips For San Francisco Organizations

Pro Tips to Try in Microsoft Teams (San Francisco Edition) Microsoft Teams offers the ultimate in efficiency and productivity for professionals who...

Read More

Microsoft Excel: Getting Started With Pivot Tables

Microsoft Excel: Getting Started With Pivot Tables Pivot tables are a great way to organize and analyze data with ease. Using this Microsoft Excel...

Read More

The Truth About How To Use Two Factor Authorization To Protect Your Technology

Using Two-Factor Authorization To Protect Your Data And Technology Here are a few things you should know about why two-factor authorization is the...

Read More