With the proliferation of cybercrime, the line between a cybersecurity and IT professional is rather symbolic:  every IT professional has cybersecurity as a priority now, maintaining focus on protecting and defending data, data, applications, devices, network infrastructure and individuals. The cybersecurity workforce shortage is even worse than what the jobs numbers suggest, and the number of unfilled cybersecurity jobs is predicted to reach 3.5 million  – as cybercrime damage costs to reach $6 trillion annually by 2021. As a result, the cybersecurity unemployment rate has dropped to unprecedented zero percent.

Ginni Rometty, IBM’s chairman, president, and CEO, said in her address speech at the IBM Security Summit just a few years back, “We believe that data is the phenomenon of our time. It is the world’s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true – even inevitable – then cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world.

In 2016, The top three cyberthreat concerns for 2016 were social engineering, insider threats, and advanced persistent threats.In 2017, global ransomware damage costs were predicted to exceed $5 billion, up from $325 million in 2015.

What to do if you become a victim of cybercrime

  1. First of all, immediately report the incident it to the appropriate staff within your organization, most importantly your tech support and network administrators. If your company uses Managed Services Provider (MSP), alert them right away.
  2. Stop using the personal computer until your computer network administrators run the diagnostics and remedy any issues if found. Use an alternative computer in the meanwhile…
  3. If you think financial accounts may have been compromised, contact your financial institution immediately and close any accounts that may have been compromised. Monitor accounts activity to avoid fraudulent charges.
  4. If you think your consumer accounts have been compromised, remember this: many people keep their billing information stored in their consumer accounts, such as Amazon or department stores online:  change your passwords and remove any credit card information stored there as soon as possible.
  5. Overall, if the password that has been compromised has also been used elsewhere, change those passwords that may have been affected, in respective accounts.
  6. Report the attack to the Federal Trade Commission.

Does your business have a cybersecurity professional? 

Take care of it before cybercrime hits your business.

You may be interested in Intelligent Business Continuity services from our NJ IT Security Consulting, IT Services, and Computer Network Support company for Small Business, that includes all assets of Managed Services.

 

 

Call us 201-493-1414 x 311 to talk to our IT consultants or Request our CyberSecurity Assessment and Consultation. Let’s start a conversation to make sure your devices are safe, your network is protected, and business continuity is secured.

How is your state of IT?

Call Us: (201) 493-1414

Related Articles

Top 10 Computer Virus Symptoms [Checklist]
How Radically Changing Corporate Culture Can Optimize Security, Communications, and Productivity
Windows 7 Has Officially Reached End Of Life
Increasing risk of CEO Fraud Emails – What to Know and How to Protect Yourself
Best Approach: Online Safety and Physical Security
Video: How many of these 23 secret keyboard combinations can boost your productivity in Windows? Plus 9 bonus combos for Mac Users
New Vulnerability: CPU Meltdown & Spectre
Go beyond CTRL+C: here are 33 lesser-known shortcuts to help your workday
Reputable highly rated Small Business IT services and tech support company in New Jersey - powersolution industry awards
Scroll to Top