What Startups Need to Do to Be Cyber Secure in 2015Hackers are out there, and they're attacking businesses large and small.

ByZach Cutler

Opinions expressed by Entrepreneur contributors are their own.

2014 was a year full of unprecedented cyber attacks in the U.S.

Big companies such asTarget,Home Depot,Michaels,P.F. Chang'sandJP Morganfell victim to data breaches, and 2015 is already heading down a similar path.Anthem, the second largest health insurance company in the U.S., announced a massive data breach on Feb. 5.

But big name businesses aren't the only targets. A report published by thePonemon Institutein September 2014 found that almost half of all U.S. companies have experienced a security breach of some sort in the past year. Hackers are out there, and they're attacking businesses large and small.

I spoke with three cybersecurity experts about 2015 trends and what startups can do to keep their data safe this year:

1. Detection over prevention

In 2015, prevention is no longer enough to keep data safe from hackers.

Related:Hackers Hijack Chipotle's Twitter Account, Tweet F-Bomb and N-Word Insults

"Hackers have gotten very sophisticated, and preventing breaches entirely is impossible," says Nat Kausik, CEO ofBitglass, a leader in cloud access security. "Companies need a two-pronged approach balancing breach prevention and breach discovery and remediation."

This year, the focus will shift from preventing attacks to detecting breaches and minimizing the harm they cause.

"This is a philosophical change that was brought about by the waves of breaches last year -- Target, JPMorgan, HomeDepot, Sony," Kausik says. "Each of these companies invested a lot in preventing breaches, and yet got hacked. The average breach lasts 229 days entirely undetected. Catching breaches early can limit the damage considerably."

Fengmin Gong, co-founder and chief strategy officer ofCyphort, an advanced malware defense company that detects and fights targeted threats, corporate espionage and IP theft, agrees that security needs to advance beyond prevention tactics.

"First we implement a "continuous monitoring and mitigation' approach," Gong says. "Next we identify all critical assets and the potential attack surface. Then we implement a detection and response solution and finally we implement an ongoing process for security posture assessment and improvement."

2. Security literacy

Security starts from within an organization. Establishing safety practices and ensuring all employees are aware of them is key.

"Policy and education of the workforce goes a long way toward better security posture, especially in this age where advanced threat actors increasingly resort to social engineering tactics in their threat campaign," Gong says.

He advises business leaders to instruct their employees to follow these basic practices:

  • Keep the endpoint system and security software updated and enable auto update.
  • Don't install apps from untrusted sources.
  • Don't install apps as the device administrator unless it's necessary.
  • Stop saying "yes" to all permission requests. Why should a news feeder access your contact list?
  • Stay vigilant of what's running devices, and investigate suspicious activities

Related:Sometimes Hackers Just Want to Embarrass You

3. Cloud protection

As technology evolves, so will cyberattacks, and the next target may be information stored in the cloud.

"In this evolving mobile and cloud era, it is no longer about protecting your enterprise boundaries or devices, but more about protecting the assets themselves, wherever they may reside," says Rehan Jalil, CEO ofElastica, a cloud security company. "As more and more valuable assets migrate to the cloud, cybercrime will follow."

Although many cloud providers have sound infrastructures, Jalil suggests that organizations are still vulnerable through the standard username and password setup that allows full access to company data.

“钓鱼网站凭证,恶意软件劫持有效的HTTPS connections, and malicious insiders are all very real threats and represent the easiest ways to attack corporate assets in the cloud," he says. "Organizations would be wise to integrate a security strategy as part of their overall cloud strategy to ensure that they are adopting safe cloud apps and are taking proper data governance and threat prevention practices."

4. Practical steps

When revamping cybersecurity efforts, Gong suggests startups take the following steps:

  1. Focus on the most valuable assets.
  2. Set clear goals.
  3. Adopt one process and one flow.
  4. Insist on tools to fit your workflow.
  5. Review and improve practices.

Although implementing data security can cost time and money, it is a critical component for businesses today.

"Putting comprehensive security solutions in place to protect your critical assets, including those stored in the cloud," Jalil says, "is a very small price to pay to avoid the massive damages we have seen organizations grapple with in 2014."

Related:Companies Need to Take Responsibility for Protecting Sensitive User Data

Wavy Line
Zach Cutler

Founder & CEO, Cutler PR

Zach Cutler is an entrepreneur and founder and CEO ofCutler PR, a tech PR agency in New York and Tel Aviv. An avid tech enthusiast and angel investor, Cutler specializes in crafting social and traditional PR campaigns to help tech startups thrive.

Editor's Pick

Related Topics

Thought Leaders

So, You've Been Hacked. These are the Best Practices for Business Leaders Post-Hack

The lasting effects of a cyber incident can impact an organization's reputation, customers, workforce, databases and network architecture.

Business News

An 81-Year-Old Florida CEO Just Indicted for a $250 Million Ponzi Scheme Ran a Sprawling Senior Citizen Crime Ring

Carl Ruderman is the fifth senior citizen in the Miami-Fort-Lauderdale-Palm Beach metropolitan area to face charges in connection with the scam.

Resumes & Interviewing

This AI Resume Tool is Only $29.97 So You Can Make Job-Hunting Easier

Expand your growth potential with this back-to-school sale.

Money & Finance

Want to Become a Millionaire? Follow Warren Buffett's 4 Rules.

企业家是不能过度指狗万官方望太多a company exit for their eventual 'win.' Do this instead.

Business News

How One Couple Became Multi-Unit, Multi-Brand Franchise Owners

When Matt and Anne Evers took the leap to buy a franchise, they never imagined they'd grow to 13 locations across two brands just eight years later.