[et_pb_section fb_built=”1″ custom_padding=”0px|0px|0px|0px” fullwidth=”on” _builder_version=”3.0.67″ background_image=”https://www.mdsny.com/wp-content/uploads/2017/08/dreamstime_xxl_83331414.jpg” background_position=”center_right” background_blend=”darken”][et_pb_fullwidth_header title=”Should I build a Million Dollar Wall around a Two Dollar Asset?” text_orientation=”center” title_font_color=”#ffffff” background_overlay_color=”rgba(0,0,0,0.33)” _builder_version=”3.0.67″ title_font=”Droid Serif||||” title_font_size=”37px”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ custom_padding=”12px|0px|0px|0px” _builder_version=”3.0.65″][et_pb_row make_fullwidth=”on” custom_padding=”27px|1px|0px|2px” _builder_version=”3.0.65″][et_pb_column type=”4_4″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.67″ text_font=”Droid Serif||||” text_font_size=”18px”]

By Michael Fiorito, MDS

Why is a Risk Assessment important? 

Some organizations have to do risk assessments to meet compliance requirements.  However, all organizations should identity their intellectual property assets and determine potential risk associated with them. 

How do I assess risk? 

Your organization is unique.  There’s no silver bullet that can surface every issue in your environment or provide a completely accurate representation of potential risks. 

Assessing risk is a process that allows your organization to measure its risk posture and identify gaps based on your systems and data and the threats and controls impacting those environments.  It’s the first step in building a mature security program.  

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#e8e8e8″ custom_padding=”0px|0px|15px|0px” _builder_version=”3.0.65″][et_pb_row make_fullwidth=”on” custom_padding=”20.5px|0px|0px|0px” _builder_version=”3.0.65″][et_pb_column type=”2_3″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.67″ text_font=”Droid Serif||||” text_font_size=”18px” inline_fonts=”Droid Serif”]

How does a Risk Assessment benefit my business? 

A risk assessment forces you to consider the potential outcomes of a breach.

You have to come face to face with these important factors: 

  • What data is valuable to our consumers and/or members?
  • What would happen if we were in the news for a data breach, even if the data lost was meaningless?
  • What legal liability do we have if something happened to the data?

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_image src=”https://www.mdsny.com/wp-content/uploads/2017/08/Risk_Dice.png” _builder_version=”3.0.67″][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding=”26px|0px|27px|0px” _builder_version=”3.0.67″][et_pb_row make_fullwidth=”on” custom_padding=”0px|0px|0px|0px” _builder_version=”3.0.67″][et_pb_column type=”4_4″ _builder_version=”3.0.67″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.67″ text_font=”Droid Serif||||” text_font_size=”18px” header_font=”Droid Serif||||”]

A risk assessment should include all systems critical to operations or which contain sensitive information. It should also include an assessment of the operational processes and procedures used to maintain and operate the systems. These processes (such as employee on-boarding/off-boarding, O/S patching) can be overlooked and may be the weak link in any network.  

By considering all avenues and weighing decisions based on analyzed risk, a risk assessment empowers your organization to make better-informed decisions.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#8d8c91″ custom_padding=”4px|0px|20px|0px” admin_label=”section” _builder_version=”3.0.65″][et_pb_row make_fullwidth=”on” custom_padding=”10px|0px|27px|0px” admin_label=”row” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_cta title=”Pulling the plug doesn’t have to be your only security solution.” button_url=”https://www.mdsny.com/contact/” button_text=”Contact Us” use_background_color=”off” _builder_version=”3.0.65″ header_font=”Droid Sans|on|||” header_font_size=”31px” body_font=”Droid Sans||||” body_font_size=”19px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_button=”on” button_text_color=”#2d3743″]

Don’t become part of a rising statistic — ensure your company is armed against a security hack.

[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]