You may hear about a major data breach here or there – but do you know what the state of cybercrime looks like in 2019?

The average cost of a data breach is nearly $4 million, according to a recent report by IBM. A median size breach puts 25,575 records at risk, so that’s about $150 per record.

There are so many scams and breaches that you barely notice the headlines anymore. But it’s in your best interest to pay attention. Consider just a few of the recent headlines and you’ll see why.

BIOS Technologies is a New Orleans IT services company and works with large to small companies to keep them safe from cyberthreats.


Cybercrime Highlights In 2019 (So Far)

iPhone Vulnerabilities Exposed

Google published research this summer regarding cyberattacks that target iPhones. The attacks have been occurring for two years with digital thieves stealing personal data after infecting iOS. Data stolen includes:

  • Passwords
  • Locations
  • Encrypted messages
  • Contacts

iPhones are popular targets, as another Google Project researcher article shows how iPhone software is easily infiltrated to give hackers remote access.


Department of Justice Press Releases

Every month the DOJ published press releases on convictions and sentences regarding captured cybercriminals. It’s an eye-opening list that includes the following stories for September (11 published in total).

The list barely scratches the surface of what’s going on in cyberspace, so it’s important to do everything you can to protect your company’s data.


How Can You Protect Company?

Pay attention and make sure your security team does too. It sometimes takes nearly a year for organizations to discover a data breach. Sometimes, it takes years. How do you avoid that scenario in your organization?

Follow these critical steps to solidify your cybersecurity:

  1. Train your staff to avoid suspicious emails.
  2. Back-Up Your Data Regularly

You need a go-to data backup solution that allows you to get back up and running quickly. Then, if you are attacked by ransomware, you simply reload the backup data. Ensure that your service provider or on-premise team follows these guidelines:

  • Back up data at least once a day.
  • Monitor backups to verify their integrity and completeness.
  • Keep your backups separate from the devices being backed up.
  1. Call an expert. Cybersecurity professionals can answer all your questions and many that you didn’t consider. Working with these subject matter experts helps you set up a robust protocol that includes:
  • Network monitoring and reporting
  • Threat detection, interception and prevention
  • Installing the latest versions of applications to ensure security patches are implemented
  • Firewall setup, maintenance and upgrades
  • Peek cybersecurity awareness

In short, cybersecurity experts manage your cybersecurity from a tactical and strategic standpoint. Relying on in-house employees may leave your company subject to risks if the resources haven’t been properly trained or fail to keep up with the latest threats.