{"id":225614,"date":"2023-10-24T18:00:29","date_gmt":"2023-10-24T18:00:29","guid":{"rendered":"https:\/\/www.markperlbergcpa.com\/cyber-network-security\/"},"modified":"2023-10-24T18:00:29","modified_gmt":"2023-10-24T18:00:29","slug":"cyber-network-security","status":"publish","type":"post","link":"https:\/\/prosperlcpa.com\/blog\/2023\/10\/cyber-network-security\/","title":{"rendered":"cyber network security"},"content":{"rendered":"<div class=\"pme-content\">\n<p><span style=\"background-color:white;\">I\u2019m continuing to avidly watch, as I\u2019m sure you are too, the unfolding events in Gaza. Though Biden issued a back-channel warning to Iran about not joining in the conflict, the possibility of a larger scale war looms. Economically, that affects gas prices and other factors of the global economy. Then there\u2019s the national budget deadline and the Congress\u2019s gridlock over finalizing it.&nbsp;<\/span><\/p>\n<p><span style=\"background-color:white;\">It\u2019s more important than ever to keep your Atlanta business doings sharp right now.<\/span><\/p>\n<p><span style=\"background-color:white;\">I\u2019ll be here to keep you informed on how bigger happenings will affect your business\u2026 and to help you thrive through it.&nbsp;<\/span><\/p>\n<p><span style=\"background-color:white;\">All of these headlines probably dominated your attention, and rightfully so, but there\u2019s something else happening in October to give attention to: Cybersecurity Awareness Month. That might make your stomach twist, thinking through all you need to be prepared for <u>within a budget<\/u>. It can be daunting to know where to allocate funds for a pressing need that is so frequently changing and developing.<\/span><\/p>\n<p><span style=\"background-color:white;\">Because my office handles so much sensitive data, you better believe this is something we monitor and update systematically.&nbsp;<\/span><\/p>\n<p><span style=\"background-color:white;\">Business spending for cyber network security is up 70 percent over the past four years, though that number has started trending downward and recent security company layoffs confirm this.<\/span><\/p>\n<p><span style=\"background-color:white;\">But recently issued SEC rules regarding the reporting of data breaches by public companies (more on that shortly) reemphasizes the importance of regularly addressing our own cyber network security measures as business owners.<\/span><\/p>\n<p><span style=\"background-color:white;\">So let\u2019s talk about budget building for your cyber network security plan.&nbsp;<\/span><\/p>\n<p><span class=\"text-huge\"><strong>Prioritizing Cyber Network Security in Your Atlanta Business<\/strong><\/span><br \/><span class=\"text-small\"><i>\u201cThe best investment you can make is in yourself.\u201d \u2015 Warren Buffett<\/i><\/span><\/p>\n<p><span style=\"background-color:white;font-family:Georgia, serif;\">There are&nbsp;<\/span><a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-139\"><span style=\"background-color:white;color:#1155CC;font-family:Georgia, serif;\">new rules from the SEC<\/span><\/a><span style=\"background-color:white;font-family:Georgia, serif;\"> regarding the reporting of data security breaches that go into effect December 15, 2023. While those rules primarily target public companies, small and private companies should know what\u2019s being required as they review their own cyber network security measures, especially since <\/span><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">the SEC has shown a willingness to extend its regulatory reach to private companies when it comes to cybersecurity.<\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">Basically, companies need to assume that they might face real cyber network security threats and breaches. And when they do, they have to tell the SEC about it within four business days if it&#8217;s a significant incident. Plus, U.S.-listed companies also have to share information about how they handle cybersecurity in their yearly reports.<\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">With all of this in mind, let\u2019s discuss how to build a cyber network security budget<\/span><span style=\"font-family:Georgia, serif;\"><\/span><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\"> for your Fulton County business<\/span><span style=\"font-family:Georgia, serif;\"><\/span><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">.<\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\"><strong>Making a budget<\/strong><\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">When building (or assessing) a budget, know that there are three basic areas that drive the needle: software and hardware, ongoing security services, and in-house training for employees.<\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">Of course you want top-notch protection for all your important stuff, but the reality is that you probably can&#8217;t afford it all. This is why budget planning is so crucial \u2013 it decides how much you can spend and where you should spend it.<\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">Here&#8217;s a simple exercise: First, make a list of all your important assets. Then, think about how vulnerable each of them is to potential threats. In other words, figure out which assets are more likely to be a security risk.<\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">Assets that are both high-risk and critical to business operations should get the lion&#8217;s share of your cyber network security budget. On the flip side, if something is low-risk and not that critical, you can allocate less money to protect it because the chance of a cyberattack is lower there.<\/span><\/p>\n<p><span style=\"background-color:white;color:#24292F;font-family:Georgia, serif;\">And don\u2019t forget a line item for incident response and recovery.<\/span><\/p>\n<p><span style=\"background-color:white;font-family:Georgia, serif;\"><strong>Factoring actual costs<\/strong><\/span><\/p>\n<p><span style=\"background-color:white;font-family:Georgia, serif;\">Cybersecurity costs can vary a lot, and here&#8217;s why:<\/span><\/p>\n<ul>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">Size and complexity: Bigger and more complex organizations need more resources to protect themselves.<\/span><br \/>&nbsp;<\/li>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">Risk level: If a company is at higher risk of a security breach, they&#8217;ll need to spend more to stay safe. How often and what type of security incidents a company faces can also affect costs.<\/span><br \/>&nbsp;<\/li>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">The cloud: If a company uses cloud services, they might need extra security measures like encryption and multi-factor authentication, which can cost more than traditional setups.<\/span><br \/>&nbsp;<\/li>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">Compliance requirements: Some industries have strict rules about cybersecurity, like healthcare and government organizations. Following these rules can be expensive.<\/span><br \/>&nbsp;<\/li>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">Outsourcing: When companies hire outside vendors for IT tasks, they need to make sure those vendors are secure.<\/span><\/li>\n<\/ul>\n<p><span style=\"background-color:white;font-family:Georgia, serif;\"><strong>Saving money where you can<\/strong><\/span><\/p>\n<p><span style=\"background-color:white;font-family:Georgia, serif;\">Despite all the costs, there are inexpensive but high value measures you can put in place.<\/span><\/p>\n<ol>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">Begin by setting up basic defenses like firewalls, antivirus software, and regular software updates, if you haven\u2019t already.<\/span><br \/>&nbsp;<\/li>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">There are free or inexpensive tools available for things like managing passwords, spotting intruders, and checking for vulnerabilities.<\/span><br \/>&nbsp;<\/li>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">Teach your employees about phishing, social engineering, and keeping data safe. It doesn&#8217;t cost much but can make a big difference.<\/span><br \/>&nbsp;<\/li>\n<li><span style=\"background-color:white;font-family:Georgia, serif;\">Instead of hiring full-time staff, think about using managed services. They can help with security and monitoring at a lower cost.<\/span><\/li>\n<\/ol>\n<p style=\"margin-left:0in;\">Now, I get it, not all of these budgeting decisions will be crystal clear. So, it&#8217;s a good idea to team up with your Chief Information Security Officer and accountant (that\u2019s me) to figure out what makes sense within your budget constraints. Reach out to talk through your budget potential in light of your particular needs:<br \/><strong><a href=\"https:\/\/calendly.com\/d\/46r-49m-93k\/10-minute-intro-call\">https:\/\/calendly.com\/d\/46r-49m-93k\/10-minute-intro-call<\/a><\/strong><\/p>\n<p style=\"margin-left:0in;\">&nbsp;<\/p>\n<p style=\"margin-left:0in;\">Secure your assets and your future.<\/p>\n<p style=\"margin-left:0in;\"><strong>Mark Perlberg<\/strong><\/p>\n<p>&nbsp;<\/p>\n<\/p>\n<p><strong>Keyword<\/strong>:&nbsp;<\/p>\n<p><strong>SEO Title<\/strong>:&nbsp;<\/p>\n<p><strong>Meta Description<\/strong>:&nbsp;<\/p>\n<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<style>.pme-content {\n\tfont-size: 1.2em\n}<\/p>\n<p>.text-tiny {\n\tfont-size: .7em\n}<\/p>\n<p>.text-small {\n\tfont-size: .85em\n}<\/p>\n<p>.text-big {\n\tfont-size: 1.4em\n}<\/p>\n<p>.text-huge {\n\tfont-size: 1.8em\n}<\/p>\n<p>.marker-yellow {\n\tbackground-color: #fdfd77\n}<\/p>\n<p>.marker-green {\n\tbackground-color: #63f963\n}<\/p>\n<p>.marker-pink {\n\tbackground-color: #fc7999\n}<\/p>\n<p>.marker-blue {\n\tbackground-color: #72cdfd\n}<\/p>\n<p>.pen-red {\n\tcolor: #e91313\n}<\/p>\n<p>.pen-green,\n.pen-red {\n\tbackground-color: transparent\n}<\/p>\n<p>.pen-green {\n\tcolor: #180\n}<\/p>\n<p>.pme-content blockquote {\n\toverflow: hidden;\n\tpadding-right: 1.5em;\n\tpadding-left: 1.5em;\n\tmargin-left: 0;\n\tfont-style: italic;\n\tborder-left: 5px solid #ccc\n}<\/p>\n<p>.pme-content .image img {\n\tdisplay: block;\n\tmargin: 0 auto;\n\tmax-width: 100%\n}<\/p>\n<p>figure.image {\n    text-align: center;\n}<\/p>\n<p>.pme-content figcaption {\n\tcolor: #333;\n\tbackground-color: #f7f7f7;\n\tpadding: .6em;\n\tfont-size: .75em;\n\toutline-offset: -1px\n}<\/p>\n<p>.pme-content .image-style-align-left {\n\tfloat: left\n}\n.pme-content .image-style-align-right {\n\tfloat: right\n}\n.pme-content .image-style-align-center,\n.pme-content .image-style-align-left,\n.pme-content .image-style-align-right,\n.pme-content .image-style-side {\n\tmax-width: 50%\n}<\/p>\n<p>.pme-content .image {\n\tposition: relative;\n\toverflow: hidden;\n\tclear: both;\n\ttext-align: center\n}<\/style>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m continuing to avidly watch, as I\u2019m sure you are too, the unfolding events in Gaza. Though Biden issued a back-channel warning to Iran about not joining in the conflict, the possibility of a larger scale war looms. Economically, that affects gas prices and other factors of the global economy. Then there\u2019s the national budget deadline and the Congress\u2019s gridlock over finalizing it.&nbsp; It\u2019s more important than ever to keep&#8230; <a class=\"more-link\" href=\"https:\/\/prosperlcpa.com\/blog\/2023\/10\/cyber-network-security\/\">Read More<a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[],"tags":[],"class_list":{"0":"post-225614","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"entry"},"_links":{"self":[{"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/posts\/225614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/comments?post=225614"}],"version-history":[{"count":0,"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/posts\/225614\/revisions"}],"wp:attachment":[{"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/media?parent=225614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/categories?post=225614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prosperlcpa.com\/blog\/wp-json\/wp\/v2\/tags?post=225614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}