White Paper
November 23, 2015, 11:35 AM EST
Author
Source: Synchrony Connect
Abstract:
Table of Contents
Cybersecurity Program
Spear phishing—including malicious links in emails that appear to be from familiar people or businesses—accounts for a large percentage of major cyberattacks. Deploying intelligent gateway solutions that analyze content in real time can help stop these malevolent URLs from reachingyour users’ inboxes. For more security, consider adding a solution that checks the safety of an emailed link when a user clicks on it. Finally, make sure all employees know how to recognize spear phishing attacks.
Sophisticated cyberattackers spend time exploring your company’s network, identifying where customer data is stored and how it’s transmitted internally before being encrypted for external transfer. Review your network environment and make sure all firewalls, intrusion detection systems, remote access and antivirus logging are enabled.
Develop a detailed 24/7 cybersecurity response and communication plan. Make sure the key members of your cyber intelligence, threat analysis, fraud and investigation teams practice responding to cyber incident scenarios. Remember, there’s no such thing as too much practice.