What Startups Need to Do to Be Cyber Secure in 2015Hackers are out there, and they're attacking businesses large and small.

ByZach Cutler

Opinions expressed by Entrepreneur contributors are their own.

2014 was a year full of unprecedented cyber attacks in the U.S.

Big companies such asTarget,Home Depot,Michaels,P.F. Chang'sandJP Morganfell victim to data breaches, and 2015 is already heading down a similar path.Anthem, the second largest health insurance company in the U.S., announced a massive data breach on Feb. 5.

But big name businesses aren't the only targets. A report published by thePonemon Institutein September 2014 found that almost half of all U.S. companies have experienced a security breach of some sort in the past year. Hackers are out there, and they're attacking businesses large and small.

I spoke with three cybersecurity experts about 2015 trends and what startups can do to keep their data safe this year:

1. Detection over prevention

In 2015, prevention is no longer enough to keep data safe from hackers.

Related:Hackers Hijack Chipotle's Twitter Account, Tweet F-Bomb and N-Word Insults

"Hackers have gotten very sophisticated, and preventing breaches entirely is impossible," says Nat Kausik, CEO ofBitglass, a leader in cloud access security. "Companies need a two-pronged approach balancing breach prevention and breach discovery and remediation."

This year, the focus will shift from preventing attacks to detecting breaches and minimizing the harm they cause.

"This is a philosophical change that was brought about by the waves of breaches last year -- Target, JPMorgan, HomeDepot, Sony," Kausik says. "Each of these companies invested a lot in preventing breaches, and yet got hacked. The average breach lasts 229 days entirely undetected. Catching breaches early can limit the damage considerably."

Fengmin Gong, co-founder and chief strategy officer ofCyphort, an advanced malware defense company that detects and fights targeted threats, corporate espionage and IP theft, agrees that security needs to advance beyond prevention tactics.

"First we implement a "continuous monitoring and mitigation' approach," Gong says. "Next we identify all critical assets and the potential attack surface. Then we implement a detection and response solution and finally we implement an ongoing process for security posture assessment and improvement."

2. Security literacy

Security starts from within an organization. Establishing safety practices and ensuring all employees are aware of them is key.

"Policy and education of the workforce goes a long way toward better security posture, especially in this age where advanced threat actors increasingly resort to social engineering tactics in their threat campaign," Gong says.

He advises business leaders to instruct their employees to follow these basic practices:

  • Keep the endpoint system and security software updated and enable auto update.
  • Don't install apps from untrusted sources.
  • Don't install apps as the device administrator unless it's necessary.
  • Stop saying "yes" to all permission requests. Why should a news feeder access your contact list?
  • Stay vigilant of what's running devices, and investigate suspicious activities

Related:Sometimes Hackers Just Want to Embarrass You

3. Cloud protection

As technology evolves, so will cyberattacks, and the next target may be information stored in the cloud.

"In this evolving mobile and cloud era, it is no longer about protecting your enterprise boundaries or devices, but more about protecting the assets themselves, wherever they may reside," says Rehan Jalil, CEO ofElastica, a cloud security company. "As more and more valuable assets migrate to the cloud, cybercrime will follow."

Although many cloud providers have sound infrastructures, Jalil suggests that organizations are still vulnerable through the standard username and password setup that allows full access to company data.

"Phished credentials, malware hijacking valid HTTPS connections, and malicious insiders are all very real threats and represent the easiest ways to attack corporate assets in the cloud," he says. "Organizations would be wise to integrate a security strategy as part of their overall cloud strategy to ensure that they are adopting safe cloud apps and are taking proper data governance and threat prevention practices."

4. Practical steps

When revamping cybersecurity efforts, Gong suggests startups take the following steps:

  1. Focus on the most valuable assets.
  2. Set clear goals.
  3. Adopt one process and one flow.
  4. Insist on tools to fit your workflow.
  5. Review and improve practices.

Although implementing data security can cost time and money, it is a critical component for businesses today.

"Putting comprehensive security solutions in place to protect your critical assets, including those stored in the cloud," Jalil says, "is a very small price to pay to avoid the massive damages we have seen organizations grapple with in 2014."

Related:Companies Need to Take Responsibility for Protecting Sensitive User Data

Wavy Line
Zach Cutler

Founder & CEO, Cutler PR

Zach Cutler is an entrepreneur and founder and CEO ofCutler PR, a tech PR agency in New York and Tel Aviv. An avid tech enthusiast and angel investor, Cutler specializes in crafting social and traditional PR campaigns to help tech startups thrive.

Editor's Pick

We're Now Finding Out TheDamaging Results of The Mandated Return to Office— And It's Worse Than We Thought.
He 'Grew Up in Bars' and Was Drinking By Age 10 — But Entrepreneurs Changed His Life. Now a Business Owner Himself,He's Paying It Forward.
LinkedIn Changed Its Algorithms — Here's How YourPosts Will Get More Attention Now
'Focus Is Just as Important as Passion': How to Avoid雷竞技手机版企业家精神缺失症in Franchising
Lock
Kevin O'Leary Recommends This6-Step Strategyfor Making Money on Social Media
Lock
ThisMindset Shift Changed My Life— And Gave Me the Courage to Leave My Well-Paid Full-Time Job.

Related Topics

Growing a Business

How to Leverage Social Media to Promote Your Book and Brand

Unlock the immense potential of social media to propel your book into the spotlight. This guide unveils the secret recipe to leverage the power of online platforms as a modern-day author.

Growing a Business

That Time Julius Caesar Was Kidnapped and Insisted His Captors Increase Their Ransom

Gee, talk about having a high opinion of yourself.

Employee Experience & Recruiting

How to Find Resumes Online and Hire the Best

Finding resumes online has become an essential part of the modern recruitment process, allowing employers to connect with a vast pool of talent quickly and efficiently. Explore effective strategies to find resumes online.

Business News

Authors Are Suing OpenAI Because ChatGPT Is Too 'Accurate' — Here's What That Means

It's one of two suits filed on Wednesday — and experts believe there are more to come.

Social Media

7的方法(和出售更多)Instagram脱颖而出

Key branding tactics from the new book 'The Ultimate Guide to Instagram for Business.'

Growing a Business

Want To Make Money As a Freelancer? Avoid This Mistake That Can Cost You Clients.

There are some key aspects of portfolio building you need to get right if you want to get clients and make a profit. This freelancer expert shares his insights that uncomplicate the process and help you turn your website into a client converter tool.