{"id":1018,"date":"2020-10-03T00:25:12","date_gmt":"2020-10-03T00:25:12","guid":{"rendered":"https:\/\/www.sugarshot.io\/?p=1018"},"modified":"2023-05-11T09:08:29","modified_gmt":"2023-05-11T09:08:29","slug":"top-takeaways-from-cybersecurity-awareness-month","status":"publish","type":"post","link":"https:\/\/www.sugarshot.io\/top-takeaways-from-cybersecurity-awareness-month\/","title":{"rendered":"4 Top Takeaways from Cybersecurity Awareness Month 2020"},"content":{"rendered":"<p dir=\"ltr\">Cybersecurity Awareness Month is an annual campaign that focuses on raising awareness about online safety practices and resources. It provides education to help reduce security risks, enabling consumers and businesses to adopt good digital habits in the war against cybercrime.<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">The theme chosen for 2020\u2019s Cybersecurity Awareness Month is \u201cDo Your Part. #BeCyberSmart.\u201d In this article, we\u2019ll review the top takeaways from the 2020 campaign, including each week\u2019s unique theme and how to adopt them in your workplace.\u00a0<\/p>\n<h2 dir=\"ltr\">What Is National Cybersecurity Awareness Month (NCAM)?<\/h2>\n<p dir=\"ltr\">With <a href=\"https:\/\/www.sugarshot.io\/different-types-of-cyberattacks\/\">cyberattacks<\/a> increasing every year, boosting awareness about online security concerns became a necessary public service. National Cybersecurity Awareness Month, or NCAM, was created by the U.S. Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA). Cybersecurity Awareness Month has been observed every October since 2004. It is now co-led by NCSA and the Cybersecurity and Infrastructure Agency (CISA).\u00a0<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">Businesses, corporations and educational institutions now use NCAM resources to educate their employees, stakeholders and students on cybersecurity issues that affect computer usage at home, school and the workplace.<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">This year\u2019s theme emphasizes the role of personal responsibility in protecting your internet-connected devices. Hackers and cybercriminals are adept at stealing data by breaking into systems via unprotected devices, so it\u2019s crucial to take preventative measures in protecting yourself and your devices online.<\/p>\n<h2 dir=\"ltr\">Cybersecurity Awareness Month Weekly Themes<\/h2>\n<p dir=\"ltr\">In 2011, the NCAM campaign implemented weekly themes that target four subjects sequentially, enabling a \u201cdeep dive\u201d into subtopics deemed relevant to the central theme.<\/p>\n<p dir=\"ltr\">Past topics included password safety, phishing, malware protection, and careers in cybersecurity.<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">The 2020 Cybersecurity Awareness Month weekly themes are:<\/p>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">If You Connect It, Protect It<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">Securing Devices at Home and Work<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">Securing Internet-Connected Devices in Healthcare<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">The Future of Connected Devices<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h3 dir=\"ltr\">Week 1 (October 5-9): If You Connect It, Protect It<\/h3>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">Being \u201cconnected\u201d goes far beyond devices with keyboards. Refrigerators, light fixtures, thermostats and even coffee machines now connect to the internet via smartphones.\u00a0<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">No one can afford to take online safety for granted. No matter the environment, taking steps to protect yourself and your devices is imperative. Empower yourself by understanding how you can shield your privacy, identity and devices wherever you are.<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\"><em><strong>Takeaway #1: Be aware of your risks and proactively protect yourself.\u00a0\u00a0<\/strong><\/em><\/p>\n<p dir=\"ltr\">\u00a0<\/p>\n<h3 dir=\"ltr\">Week 2 (October 12-16): Securing Devices at Home and Work<\/h3>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">In 2019, total breaches were up <a href=\"https:\/\/www.cnet.com\/news\/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year\/\">33%<\/a> over the previous year, heavily affecting retailers, public entities and medical services. The blurred lines between home and work create security nightmares if <a href=\"https:\/\/www.sugarshot.io\/the-small-business-cyber-security-checklist\/\">safety protocols<\/a> are ignored &#8212; or don\u2019t exist.\u00a0<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">Breaches that target businesses put customers at risk by exposing account numbers and sensitive data. Conversely, consumers falling prey to phishing scams while working from home affect company networks by transferring malware and viruses over internet connections. Successful cybersecurity requires adherence to established security measures.\u00a0<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\"><em><strong>Takeaway #2:\u00a0 Securing your devices thwarts hackers from infiltrating systems containing sensitive data.\u00a0 \u00a0<\/strong><\/em><\/p>\n<p dir=\"ltr\">\u00a0<\/p>\n<h3 dir=\"ltr\">Week 3 (October 19-23): Securing Internet-Connected Devices in Healthcare<\/h3>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">Healthcare is one of the most sensitive industries for data infiltration. Over <a href=\"https:\/\/techjury.net\/blog\/healthcare-data-breaches-statistics\/#gref\">2,550<\/a> data breaches of PHI (protected health information) have affected millions of records in the last ten years.\u00a0\u00a0<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">Healthcare breaches involve many types of internet-connected devices. However, most violations resulted from negligence vs. malicious intent. Maintaining strict security protocols like strong password policies and limiting access to sensitive information reduces data theft risk.<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\"><em><strong>Takeaway #3: Alleviate healthcare data risk by enforcing strict security access and policies.<\/strong><\/em><\/p>\n<p dir=\"ltr\">\u00a0<\/p>\n<h3 dir=\"ltr\">Week 4 (October 26-30): The Future of Connected Devices<\/h3>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">With the speed of technology growing ever faster, it\u2019s tough to forecast how our connected devices will shape the future. However, the development of 5G technology has already created concerns about expanded opportunities for hackers. Learn more about how to adapt to this changing landscape so that you can feel confident and empowered as we evolve in technology.<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\"><em><strong>Takeaway #4: Educate yourself about technology advances and embrace change.<\/strong><\/em><\/p>\n<p dir=\"ltr\">\u00a0<\/p>\n<h2 dir=\"ltr\">Tips for Implementing NCAM Takeaways In the Workplace<\/h2>\n<p dir=\"ltr\">What\u2019s the best way to share the top takeaways of Cybersecurity Awareness Month?\u00a0<\/p>\n<p>\u00a0<\/p>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">Be generous in sharing <a href=\"https:\/\/www.cisa.gov\/publication\/national-cybersecurity-awareness-month-publications\">resources<\/a> with your employees, students or stakeholders.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">Publicize 2020\u2019s theme, \u201cDo Your Part. #BeCyberSmart.\u201d Use corporate communication channels like email, social media and your website to spread the word.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">Offer continuous cybersecurity training and education during NCAM and beyond.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">Create <a href=\"https:\/\/www.sugarshot.io\/is-byod-worth-the-investment\/\">BYOD<\/a> policies for remote workers that enforce rules for securing internet-connected devices.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\" role=\"presentation\">Protect your assets by having a <a href=\"https:\/\/www.sugarshot.io\/the-4-levels-of-data-backup\/\">reliable data backup and recovery strategy<\/a> to protect against data loss due to cybercrime.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">Investing in <a href=\"https:\/\/www.sugarshot.io\/services\/cyber-security-los-angeles\/\">cybersecurity<\/a> is no longer an option. Protecting your business against cyberattacks must be top of mind for long-lasting safety and success.<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.sugarshot.io\/\">SugarShot<\/a> is an L.A.-based managed services provider that helps your business take control of your cybersecurity systems, monitoring and software. Our thorough 63-point <a href=\"https:\/\/www.sugarshot.io\/4-things-an-it-security-risk-assessment-will-reveal-about-your-business\/\">IT security risk assessment<\/a> will identify your threats and vulnerabilities. We\u2019ll help you establish processes and guidelines to protect your critical resources and future-proof your business.\u00a0<\/p>\n<p>\u00a0<\/p>\n<p dir=\"ltr\">To learn more about SugarShot\u2019s cybersecurity services, <a href=\"https:\/\/www.sugarshot.io\/contact-us\/\">contact us<\/a> today.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"Cybersecurity Awareness Month is an annual campaign that focuses on raising awareness about online safety practices and resources. It provides education to help reduce security risks, enabling consumers and businesses to adopt good digital habits in the war against cybercrime. \u00a0 The theme chosen for 2020\u2019s Cybersecurity Awareness Month is \u201cDo Your Part. #BeCyberSmart.\u201d In [&hellip;]","protected":false},"author":2,"featured_media":1019,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[6,1],"tags":[],"class_list":["post-1018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-msp-advice"],"_links":{"self":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/posts\/1018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/comments?post=1018"}],"version-history":[{"count":0,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/posts\/1018\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/media\/1019"}],"wp:attachment":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/media?parent=1018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/categories?post=1018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/tags?post=1018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}