'

Improve your cybersecurity strategy: Do these 2 things

As cybersecurity gets more dangerous and more critical to organizations of all sizes, the answer is to prioritize your resources to guard the right stuff—because you can't protect it all.

Over 77% over businesses suffered a cybersecurity attack last year, according to the IT Security Economics Report from Kaspersky Lab.

That percentage is consistent with lots of other security research, and the number of companies admitting that they have been attacked has continued to move upward each year over the past several years.

Special feature

Special report: A winning strategy for cybersecurity (free PDF)

This ebook, based on the latest ZDNet/TechRepublic special feature, offers a detailed look at how to build risk management policies to protect your critical digital assets.

Read More

Every company, no matter how big or small, is now a target. The question is what can you do to best protect yourself with the resources you have?

The answer is two things.

1. Take a risk management approach

The organizations with the best track record in cybersecurity have long figured out that they can't secure everything or have a perfect security posture. Instead, they approach cybersecurity like an insurance company, by taking a risk management strategy.

They audit their organization to understand where their most valuable data lives and then prioritize their resources to protect it--whether that data is at rest, in transit, or anywhere that it flows.

SEE: Cyberweapons are now in play: From US sabotage of a North Korean missile test to hacked emergency sirens in Dallas (TechRepublic) | Download PDF

2. Write good security policies

Once you have a deep understanding of where your most valuable data lives and how attackers could potentially do the most damage to your company, then you need a set of good policies to protect it.

These policies need to be updated annually and you need to communicate them in a way that your employees clearly understand why they should care and what they can do to be part of the solution. And if you need help drafting your cybersecurity policies, our sister site Tech Pro Research offers a lot of different templates that can help you get started.

SEE: Ransomware: An executive guide to one of the biggest menaces on the web

Special report

To learn more about this important topic, read our special report "A Winning Strategy for Cybersecurity" (which will be released on Tuesday, April 3). You will be able to read all of the articles on ZDNet or download them in one PDF on TechRepublic, available for free to registered users.

Red umbrella
Image: iStockphoto/lucadp

ZDNET'S MONDAY MORNING OPENER

The Monday Morning Opener is our opening salvo for the week in tech. Since we run a global site, this editorial publishes on Monday at 8:00am AEST in Sydney, Australia, which is 6:00pm Eastern Time on Sunday in the US. It is written by a member of ZDNet's global editorial board, which is comprised of our lead editors across Asia, Australia, Europe, and the US.

PREVIOUSLY ON MONDAY MORNING OPENER: