Ostra
  • Email Sign Up
  • Contact
  • Home
  • Technology
  • Clients
  • Partners
  • About
    • Careers
  • Blog
  • Contact
  • Search
  • Menu Menu
The Ultimate Reality Check for Cybersecurity

Highlights from BrightTALK Webinar: The Ultimate Reality Check for Cybersecurity

July 21, 2021/in Cybersecurity 101, Security /by Stacey Kusnier

By Ostra Cybersecurity

On July 12, Ostra presented a free BrightTALK webinar: The Ultimate Reality Check for Cybersecurity. In this informative discussion, our panel of cybersecurity experts—including Ostra Co-Founder Michael Kennedy and Chief Growth Officer Paul Dobbins—shared how real-life threat events during the pandemic have forever changed the cyber threat landscape for businesses.

The presentation also included tips and strategies for combating threats in the face of endpoint visibility and control challenges—which have become harder for businesses to manage as remote workstations, virtual meetings and cloud-based apps and file sharing has become commonplace.

Organizations of all sizes are increasingly being targeted by cybercriminals—through ransomware, phishing schemes or other malware attacks—due to insecure endpoints. The panelists discussed some of the recent, high-profile cyberattacks that are still impacting the business world, and whether the latest governmental actions will be effective.

Panelists for this webinar presentation included: Michael Kennedy, Co-Founder and CTO at Ostra Cybersecurity; Oscar Minks, Director of Technical Solutions and Services at FR Secure; and Heidi J.K. Fessler, Founder and Cybersecurity/Data Privacy Attorney at Innova Law Group. The discussion was moderated by Paul Dobbins, Chief Growth Officer at Ostra Cybersecurity.

Why endpoint security matters (now, more than ever)

Over the past 12-15 months, a lot has changed in the cyber-threat landscape. The Covid-19 pandemic forced many companies to rapidly shift to a remote workforce; an unprecedented number of employees were suddenly working from home, sometimes with little technical/configuration support.

“During lockdown, we saw companies using old machines that had not been patched, or they had vulnerabilities,” shared Michael Kennedy. Although Ostra helped those clients with remediation, the more ideal scenario is to be proactive. “Make sure everything is patched and updated,” he advised. “Be ready for it. Plan this out. Have a policy.”

Amid the rising tide of virtual transactions, Ostra also heard from business leaders who wondered why they should prioritize cybersecurity when so much personal and financial information was already available online. Would it even matter?

“I think we have become numb to all these cyber events—the Target breach, the Experian breach,” stated Michael Kennedy. But he warned that complacency is dangerous, since ransomware events can have a significant impact—and most small businesses don’t recover.

Adding to Michael’s point, attorney Heidi Fessler shared an alarming statistic: “Eighty percent of SMBs that experience a data breach will lose their business. It is terminating,” she said. “Mostly because you didn’t think it could happen and you’re not ready.”

Heidi has also worked with small businesses that had a false sense of security about avoiding ransomware or malware because they worked with a managed service provider or an IT person. “IT and information security are not the same people,” she stated. “Data loss prevention is on the data security side. Just because someone is keeping your computers running, they are not [necessarily] a security person.”

Tackling zero-day exploits

The panelists also discussed the challenges of dealing with zero-day exploits.

“Zero-day is a newly discovered vulnerability with no fix for it,” explained Oscar Minks. “There can be work-arounds, but nothing is properly patched or corrected at this point.” Since the pandemic, the number of zero-day attacks has increased significantly. How can businesses better protect themselves against them?

Oscar suggested that the first step is to take inventory: businesses should know their environment, know their endpoints, know their network, and don’t let them be exposed.

“Innately, we should consider all of our applications are insecure,” Oscar shared. “Even if they are properly patched, protecting and isolating those services is important. Be proactive to protect those assets.”

Other real-world cybersecurity topics

In the remaining segments of the webinar, our panelists covered several other real-world cybersecurity topics including:

  • How should businesses hold an MSP or MSSP accountable?
  • What is ransomware-as-a-service, and how does it work?
  • Why is it important to separate IT and Information Security roles in your organization?
  • What are common misconceptions about cloud security?
  • What is the most important thing businesses can do to make endpoints more secure?
  • What role do policies, processes and insurance play in cybersecurity?
  • Do government actions work? What else can help fix a broken cybersecurity industry?

The Ultimate Reality Check for Cybersecurity is a free, 50-minute webinar. To watch the on-demand presentation in its entirety, please visit our event page on BrightTALK.

 

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail

Subscribe to our Newsletter

Recent Posts

  • Protecting What We Value: Why Data Privacy Is Worth the Effort
  • Ostra Cybersecurity Expands Partner Success Team
  • Ostra’s Year in Review
  • Ostra Cybersecurity Adds Director for Rapidly Expanding Channel Partner Network
  • Employee Spotlight: Eunice Asemnor, Security Analyst
  • PRESS RELEASE: Ostra Cybersecurity Secures Capital to Bring Fortune 100-Caliber Protection to Small and Mid-Sized Businesses
  • “Who Can You Trust” – A Hacks and Hops Session Recap
  • Why Businesses Keep Losing the War on Cyber Terror: Part 3
  • Why Businesses Keep Losing the War on Cyber Terror: Part 2
  • Why Businesses Keep Losing the War on Cyber Terror: Part 1

Archives

Contact

Ostra Cybersecurity, Inc.
6101 Baker Rd
Suite 202
Minnetonka, MN 55345

contact@ostra.net    (866) 336-7872

Subscribe to our Newsletter

Get Social

© 2023 Ostra Cybersecurity, Inc. -
  • Website Terms & Conditions
  • Privacy Policy
  • Terms of Service
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

Accept

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy