Progress vs. Security

Once, it was enough for thieves to steal a key to gain entry to their target. But, as advanced security technologies, such as radio frequency identification (RFID), retinal scanning and video surveillance, have become commonplace, criminals have developed increasingly sophisticated methods to ensure they can still break in. From spoofing IP addresses to conducting sophisticated phishing attacks, malicious actors — now hackers — have come a long way from blowing up bank vaults with T.N.T.

Here are a few strategies to keep pace with the times — and the technology.

1) Hire the right people. With technology constantly changing, organizations require IT security professionals with a broad range of experience and security certifications, such as GSEC, CISSP and CISM. They’ll also need to be able to effectively communicate security policies, potential threats, and incident response procedures with non-tech savvy coworkers.

2) Make an incident response plan. Knowing what to do in the event of a security breach is just as important as being able to identify a threat. Ensure that incident response roles and responsibilities are clear, and that that everyone in your organization knows how to contact the incident handler and resource manager in the event of an incident.

3) Provide security training. Security training should be company-wide, not just for the IT department. Breaches can cost your organization millions — not to mention your reputation. Take the time to train employees on best practices for entering sensitive information online, using email and other company resources, and securing personal computers and mobile devices.