Tips for Protecting Your Company Against Cyberattacks

24 November 2015 Privacy, Cybersecurity & Technology Law Perspectives Blog

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t. Hackers are becoming more sophisticated, and their knowledge evolves with every new technology. As discussed by a panel of experts at the 2015 FOLEYTech Summit however, there are certain steps that companies can take to help prevent these cyberattacks from occurring.

1. Understand Why Hackers May be Interested in your Company

Cyberattacks have become threats that system administrators and webmasters need to guard against. In order to adequately guard the company, it is first important to understand why a hacker does what he or she does. Potential reasons:

  • To use your computer for illicit purposes
  • To steal valuable information
  • Thrill and excitement
  • Prestige and bragging rights
  • To spy on someone
  • Money (e.g. credit card fraud)
  • To cause financial or reputational harm

There is a need to be proactive when it comes to protecting your system from such attacks.

2. Include the Right People

In additional to building walls strong enough to prevent hackers from accessing your company’s information, you must build a strong team to develop and implement a cybersecurity strategy. This team can be hired or outsourced depending on the needs and resources of your company. If hiring internally, your team should be led by a Chief Technology Officer (CTO) whose role should be to know your company’s IT systems inside and out, to know how to act upon the first signs of a breach, and to know how to place the appropriate road blocks for hackers. One of the CTO’s primary tasks will be to keep the company’s officers and directors informed of any real or potential breach, in order to allow them to act appropriately.

3. What can the Technology Team do?

Once you have the right team in place, there are many steps that can be taken to protect the company.

First, your company’s systems can be tightened by, for example, deactivating unnecessary software, configuring the base operating system for increased security or installing a firewall. Second, a sufficiently qualified technology team will be able to identify and fix any existing holes in your systems. Finally, the technology team should develop company policies and educate the employees on the use of strong passwords and file encryption.

When a company is attacked, the blame ultimately falls on the company’s executive members, and the victims’ question becomes “Did the company do enough to protect itself?” You don’t want to have to answer “no.” While it is true that cyberattacks cannot be stopped, they can certainly be reduced or prevented to the extent the right steps are taken.

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Related Services

Insights

Cryptocurrency in China is like BIG BROTHER in 1984!
20 October 2019
Internet, IT & e-Discovery Blog
California Governor Signs New Telehealth Insurance Law
18 October 2019
Health Care Law Today
Continued Increase in E-Commerce and Online Ordering Changes Landscape of Urban Transportation
17 October 2019
Dashboard Insights
CMS Proposes Revisions to Stark Law
16 October 2019
Health Care Law Today
PATH Summit 2019
18-20 December 2019
Arlington, VA
MedTech Impact Expo & Conference
13-15 December 2019
Las Vegas, NV
Review of 2020 Medicare Changes for Telehealth
11 December 2019
Member Call
BRG Healthcare Leadership Conference
06 December 2019
Washington, D.C.