Scott Mayor Advocates Taking Proactive Cybersecurity Measures to Safeguard Risk Management

Scott Mayor Advocates Taking Proactive Cybersecurity Measures to Safeguard Risk Management
Photo: Unsplash.com

By: Maria Williams

As cyber threats continue to evolve, with malicious actors coming up with creative ways, small and medium-sized enterprises (SMEs) need to adapt and acknowledge that they are just as susceptible to cyber threats as large corporations. Scott Mayor, CEO of Endurance Risk & Management Services, underscores this truth, particularly emphasizing the often-overlooked vulnerabilities of SMEs. His approach to cybersecurity whirls around a foundational principle: risk management is an ongoing, iterative process.Ā 

For small businesses acknowledging the risk is the first hurdle. ā€œMany assume only large-sized companies are targets, but cyber threats don’t discriminate. Every business handles data – be it employee information, client details, or vendor connections,ā€ Scott says. This misconception leaves these businesses vulnerable, as they underestimate their attractiveness to cyber criminals.Ā 

Scott likens the cybersecurity challenge to any other risk management responsibility. He explains, ā€œAll business owners need to identify the risks, analyze them, figure out the strategy for avoidance, transfer or prevention and constantly refine the approach.ā€ This iterative process, known as the risk management wheel, requires a continuous improvement path where each cycle informs the next, ensuring that risk management practices evolve with emerging threats.Ā 

Cybersecurity is fundamentally data protection. Personally identifiable information (PII), such as social security numbers, names, and email addresses, are prime targets. SMEs must understand that their data is just as valuable. The threat can be internal, such as disgruntled employees with access to passwords, or external, involving third-party vendors. Scott further points out, ā€œYour vendor’s vulnerability can become yours. If the system is compromised, it can open a path to their data.ā€ This interconnectedness just shows that cybersecurity must be a priority for all parties involved.Ā 

Cyber insurance is an essential part of managing cyber risks nowadays. There are two aspects to this: protecting your assets and covering liabilities that may arise if the compromised system affects others. ā€œEven the reputation is at risk,ā€ Scott warns, ā€œFor SMEs, a data breach can damage client trust and retention.ā€ As the saying goes, it takes 20 years to build a reputation and a few seconds of a cyber incident to ruin it. While many SMEs might lack the resources to fully implement extensive cybersecurity measures, they can invest in cyber insurance to mitigate the financial impact of potential breaches.Ā Ā 

Certain exposures such as fleet management have long established preventative tools and techniques in place. Due to the nature of cybersecurity constantly evolving the management of such risk requires constant vigilance and adaptation. Moreover, Scott admits that many small businesses were established even before the roaring era of computers. ā€œBusinesses that started before the internet must adapt to new, sophisticated attacks,ā€ he explains. He is sure that education is the first line of defense in this case.Ā 

Password management is a simple yet often neglected aspect of cybersecurity. What is astonishing is that the 123456 password still remains one of the most common ones, according to online password management company Nordpass. Educating the employees is inevitably essential. The expert states, ā€œYou can’t use your first name, last name, pet’s name, or something that is so personal to you. If at all, one wants to use a name, then one needs to break it up with symbols or numbers.ā€Ā 

ā€œBeyond education, technical tools such as firewalls, spam blockers, and multi-factor authentication are required,ā€ advocates Scott. However, balancing these tools is critical. Overly stringent spam filters can block legitimate emails, disrupting business operations.Ā 

Hiring third-party risk management for penetration testing and ongoing education can help SMEs identify vulnerabilities and ensure their defenses are effective. Expert Scott mentions, ā€œPenetration tests reveal weaknesses in your system, allowing you to address them before they’re exploited.ā€ Furthermore, third party educational tools are available to keep staff informed and current in order to maintain their ongoing vigilance.Ā Ā 

Phishing, a common cyber threat with 3.4 billion emails being sent per day, is now incrementally facilitated by artificial intelligence (AI), making fraudulent communications harder to detect. Even online shopping shipping fraud is the most common one. Scott gives an example, ā€œAn email like – The person that shipped this to you didn’t pay enough money. So I need $7 from you to deliver your package. Please enter your bank account information to pay those $7, for smooth package delivery – Now, you think about it. Who cares about $7? You get UPS deliveries every day. You jump online and provide the routing number password, and boom, it’s gone. And you don’t get to know that something bad has happened until you reconcile your bank account.ā€Ā 

He further states and advises, ā€œAI makes it easier to draft convincing fraudulent emails. Even though it is understandable that one needs to revert ā€˜ASAP’, one needs to slow down, verify, and not respond impulsively.ā€ Techniques such as googling the subject line of suspicious emails or directly contacting the purported sender through known channels can prevent many phishing attempts.Ā 

Scott Mayor’s above insights make it clear: cybersecurity is not a one-time fix but a continuous process of education, improvement, and vigilance. As the exposure to breaches of cyber security transform daily, SMEs need a vigilant awareness and approach to managing these risks, it is no longer exclusive to larger corporations. This can be built internally or with the support of third party risk management providers.Ā Ā 

Published by: Nelly Chavez

This article features branded content from a third party. Opinions in this article do not reflect the opinions and beliefs of CEO Weekly.