{"id":133551,"date":"2020-04-10T19:19:40","date_gmt":"2020-04-10T17:19:40","guid":{"rendered":"https:\/\/gamestrategies.io\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/"},"modified":"2024-11-01T17:16:50","modified_gmt":"2024-11-01T16:16:50","slug":"10-questions-to-check-the-status-of-your-companys-cybersecurity","status":"publish","type":"post","link":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/","title":{"rendered":"10 questions to measure your company&#8217;s IT security"},"content":{"rendered":"<p>As new technologies continue to emerge and adapt, <a href=\"https:\/\/www.game-learn.com\/en\/resources\/blog\/what-is-the-cybersecurity-framework-for-businesses\/\">cybersecurity is becoming more and more important in business environments<\/a>. We&#8217;ve chosen 10 key questions you should ask to see if your company is ready to safeguard itself from potential attacks on its digital security:<\/p>\n<h3 style=\"padding-left: 40px;\">1. How much of your budget is invested in cybersecurity?<\/h3>\n<p style=\"padding-left: 40px;\">According to a research report by <a href=\"https:\/\/i.crn.com\/sites\/default\/files\/ckfinderimages\/userfiles\/images\/crn\/custom\/2019\/AttackIQ_REPORT_Ponemon.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Ponemon Institute<\/a>, surveyed companies spent an average of $18.4M a year on cybersecurity. Even with this investment, data breaches are still common occurrences.<\/p>\n<h3 style=\"padding-left: 40px;\">2. Do your employees have the training they need to prevent breaches in computer security?<\/h3>\n<p style=\"padding-left: 40px;\">\u201c60% of all European SMBs fall victim to cyberattacks they weren\u2019t prepared for.\u201d* For this reason, it&#8217;s important to implement cybersecurity training in order to give all your employees the preventive tools they need.<\/p>\n<h3 style=\"padding-left: 40px;\">3. Are your employees able to easily spot viruses and malware?<\/h3>\n<p style=\"padding-left: 40px;\">It\u2019s vitally important that all employees have the necessary training to identify possible attacks and viruses.<\/p>\n<h3 style=\"padding-left: 40px;\">4. Do you know what applications and removable devices your company uses?<\/h3>\n<p style=\"padding-left: 40px;\">It\u2019s critical to know whether the use of web applications is appropriate in your company. The same goes for removable devices.<\/p>\n<h3 style=\"padding-left: 40px;\">5. Do you promote the safe use of social networks and email?<\/h3>\n<p style=\"padding-left: 40px;\">Many times companies forget to take the necessary precautions to properly train in the use of everyday platforms and tools such as social networks and email.<\/p>\n<h3 style=\"padding-left: 40px;\">6. Do you control your business data?<\/h3>\n<p style=\"padding-left: 40px;\">It is not a secret that a large part of cyberattacks focuses on stealing and controlling data. According to the <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">2019 Cost of a Data Breach<\/a> Report, the average total cost of a data breach climbed from $3.5 million in 2014, showing a growth of 12 percent between 2014 and 2019.<\/p>\n<h3 style=\"padding-left: 40px;\">7. Do employees make proper use of passwords and personal data?<\/h3>\n<p style=\"padding-left: 40px;\">Passwords are part of the basis of digital security as they are an essential element of control access.<\/p>\n<h3 style=\"padding-left: 40px;\">8. Do your employees know the risks of using public Wi-Fi networks?<\/h3>\n<p style=\"padding-left: 40px;\">Public Wi-Fi networks cyberattacks are easier, since anyone who accesses that network, with the appropriate knowledge, can access the information contained in the devices connected to that network and steal the information they want. That is why safe browsing practices should be encouraged by the companies.<\/p>\n<h3 style=\"padding-left: 40px;\">9. Do you control the security of all business users?<\/h3>\n<p style=\"padding-left: 40px;\">According to the <a href=\"https:\/\/www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Ninth Annual Cost of Cybercrime Study<\/a> conducted by Accenture, \u201ccountering internal threats is still one of the biggest challenges with a rise in phishing and ransomware attacks, as well as malicious insiders.\u201d<\/p>\n<h3 style=\"padding-left: 40px;\">10. Do you have a computer risk prevention plan?<\/h3>\n<p style=\"padding-left: 40px;\">&#8220;60% of European SMEs that are victims of cyberattacks disappear in the six months following the incident, often burdened by the average cost of the attack, which is usually around 35,000 euros&#8221;. *<\/p>\n<h2>Train your employees in cybersecurity in a fun way<\/h2>\n<p>Now it is your turn, you have the opportunity to train the employees of your company in cybersecurity in a unique and innovative way with <a href=\"https:\/\/www.game-learn.com\/en\/catalog\/\">Crypto<\/a>, the serious game with the bases you need to overcome the checklist with 10\/10.<\/p>\n<p>Crypto is aimed at any user of computing devices with a low-medium level of knowledge about cybersecurity. Any person who handles personal or corporate data on internal or external networks, both from mobile and fixed devices.<\/p>\n<p>The training objective of the Crypto video game is to educate and sensitize the user about the common mistakes and bad practices that are committed in relation to computer security, both personally and in corporate environments, compromising valuable data and confidential information.<\/p>\n<p>Don&#8217;t wait any longer to start your cyber adventure. Subscribe to Gamelearn&#8217;s online platform, the results will surprise you!<\/p>\n<p>*This data comes from the Google study \u201c<a href=\"https:\/\/www.ospi.es\/export\/sites\/ospi\/documents\/documentos\/Seguridad-y-privacidad\/Google_Panorama-actual-de-la-ciberseguridad-en-Espana.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Panorama actual de la Ciberseguridad en Espa\u00f1a<\/a>\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As new technologies continue to emerge and adapt, cybersecurity is becoming more and more important in business environments. We&#8217;ve chosen 10 key questions you should ask to see if your company is ready to safeguard itself from potential attacks on its digital security: 1. How much of your budget is invested in cybersecurity? According to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":127827,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[157],"tags":[],"class_list":["post-133551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 questions to measure your company&#039;s IT security<\/title>\n<meta name=\"description\" content=\"We have selected 10 questions you should ask yourself to check whether your company is prepared to overcome possible cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 questions to measure your company&#039;s IT security\" \/>\n<meta property=\"og:description\" content=\"We have selected 10 questions you should ask yourself to check whether your company is prepared to overcome possible cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Game Strategies\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-10T17:19:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T16:16:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/blur-bright-business-codes-207580.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"959\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gamelearn Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gamelearn Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 questions to measure your company's IT security","description":"We have selected 10 questions you should ask yourself to check whether your company is prepared to overcome possible cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"10 questions to measure your company's IT security","og_description":"We have selected 10 questions you should ask yourself to check whether your company is prepared to overcome possible cyberattacks.","og_url":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/","og_site_name":"Game Strategies","article_published_time":"2020-04-10T17:19:40+00:00","article_modified_time":"2024-11-01T16:16:50+00:00","og_image":[{"width":1280,"height":959,"url":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/blur-bright-business-codes-207580.jpg","type":"image\/jpeg"}],"author":"Gamelearn Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gamelearn Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/","url":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/","name":"10 questions to measure your company's IT security","isPartOf":{"@id":"https:\/\/gamestrategies.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/blur-bright-business-codes-207580.jpg","datePublished":"2020-04-10T17:19:40+00:00","dateModified":"2024-11-01T16:16:50+00:00","author":{"@id":"https:\/\/gamestrategies.io\/en\/#\/schema\/person\/ba8bb23a0fcb9db323e5491ea255ae7a"},"description":"We have selected 10 questions you should ask yourself to check whether your company is prepared to overcome possible cyberattacks.","breadcrumb":{"@id":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/#primaryimage","url":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/blur-bright-business-codes-207580.jpg","contentUrl":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/blur-bright-business-codes-207580.jpg","width":1280,"height":959},{"@type":"BreadcrumbList","@id":"https:\/\/gamestrategies.io\/en\/blog\/10-questions-to-check-the-status-of-your-companys-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/gamestrategies.io\/en\/"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/gamestrategies.io\/en\/blog\/category\/uncategorized\/"},{"@type":"ListItem","position":3,"name":"10 questions to measure your company&#8217;s IT security"}]},{"@type":"WebSite","@id":"https:\/\/gamestrategies.io\/en\/#website","url":"https:\/\/gamestrategies.io\/en\/","name":"Game Strategies","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gamestrategies.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gamestrategies.io\/en\/#\/schema\/person\/ba8bb23a0fcb9db323e5491ea255ae7a","name":"Gamelearn Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gamestrategies.io\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5fc7a4184272ac538ad3a7175396848de55d3c6c165113c5acded63cd953840?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5fc7a4184272ac538ad3a7175396848de55d3c6c165113c5acded63cd953840?s=96&d=mm&r=g","caption":"Gamelearn Team"},"url":"https:\/\/gamestrategies.io\/en\/blog\/author\/gamelearn\/"}]}},"_links":{"self":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/posts\/133551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/comments?post=133551"}],"version-history":[{"count":0,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/posts\/133551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/media\/127827"}],"wp:attachment":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/media?parent=133551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/categories?post=133551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/tags?post=133551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}