Cyber threats have evolved into a pressing business issue, impacting operations, reputation, and the bottom line. Recognizing this shift, we recently hosted a thought-provoking webinar titled “Preventing Cyber Incidents: Your Blueprint For Cyber Resilience.”
During the session, Turn Key Solutions President Henry Overton was joined by cybersecurity attorney and former U.S. Army Lt. Colonel Sarah Anderson of SWA Law. Together, they unpacked how organizations can proactively manage cyber risks through administrative strategies, legal insights, and practical governance, without diving into the technical weeds.
In this blog post, we’ll break down the key takeaways from the webinar and explore how your business can bridge the gap between technology and risk management, starting with the human and procedural elements that often go overlooked.
Cybersecurity Reality Check: What Most Businesses Get Wrong
Sarah’s opening message was candid: cybersecurity is never foolproof. “There’s no such thing as 100% security,” she said. “No vendor should claim they can fully prevent attacks. The goal is to do the best you can with the resources available.” Think of security as eating an elephant one bite at a time. Progress, not perfection, is what matters.
Progress, not perfection, is what matters.
Understanding the real threat landscape starts with debunking some common misconceptions that most business owners have regarding cybersecurity threats to their business.
Top 5 Cybersecurity Myths And Why They’re Dangerous
- “We’re too small to be a target.”
Small businesses are often more attractive to attackers. Why? Because they’re perceived as having weaker defenses and limited budgets. Cybercriminals know that smaller organizations may lack the resources for robust security. - “We don’t have anything valuable.”
It’s not always about your data, it’s about your connections. Hackers often target smaller vendors to gain access to larger partners or clients. If others trust your systems, you’re a potential gateway. - “We’re encrypted in the cloud, so we’re safe.”
Encryption is only effective if your credentials are secure. Once attackers gain access, encryption offers no protection; it “melts away” the moment they log in with valid credentials. - “We have backups and insurance, so we’re covered.”
This mindset can be dangerously misleading. Insurance policies often have strict limitations, and attackers frequently target and destroy backups first. Without offline or immutable backups, recovery may be impossible. - “We’ll just keep a breach quiet.”
In the age of public breach-reporting sites and dark web forums, silence isn’t an option. Most breaches become public, often by the attackers themselves. Transparency and preparation are your best defenses.
Watch the Webinar Now:
Administrative Cybersecurity: The Overlooked Defense
The Cybersecurity Trinity: Physical, Technical, Administrative
Cybersecurity is often framed around tools and technology, but true resilience comes from a balanced approach.
One helpful framework breaks it down into three pillars:
- Physical security – Locked doors, ID badges, surveillance systems, and access controls.
- Technical security – Firewalls, antivirus software, endpoint detection, and other digital defenses.
- Administrative controls – Policies, employee training, vendor management, and documented procedures.
While physical and technical measures are essential, administrative practices are often the first line of defense. These human-centered controls help prevent incidents before technology even comes into play by shaping behavior, setting expectations, and managing risk proactively.
Your Business Data Might Be More Valuable Than You Think – Find Out How Secure Your Data Is!
Key Administrative Tools You Should Implement
- Security Awareness Training
Your strongest firewall is a well-trained employee. Regular phishing and awareness training sharpens your team’s instincts, transforming hesitation into protection and making every employee a critical part of your cyber defense.
Why it matters:
- Attackers now use AI to craft convincing phishing emails with fewer spelling errors and more realistic language.
- Look for signs like odd punctuation, new domain extensions (e.g., .ai, .today), and urgency cues like “Immediate Action Required.”
- Acceptable Use and Device Policies
Employees must understand that company devices aren’t private. Make clear what employees can and cannot do with company devices. Include policies around privacy, reporting suspicious behavior, and prohibited sites (e.g., dating sites, streaming sites, AI chatbots).
Sarah advised clearly stating:
- No personal email on work devices
- No browsing of dating, gambling, or adult sites
- No saving passwords or clicking “remember me” on shared devices
Why? These behaviors make it easier for attackers to gather login tokens (cookies) and bypass multi-factor authentication.
“You’d be shocked at how many breaches I investigate that start with something as dumb as accessing a gambling site on company time,” she noted.
- Third-Party Risk Management (TPRM)
Vendors are often a hidden vulnerability. Vet vendors thoroughly and limit their access.
Steps to take:
- Google them: Search their business name with terms like “cyber incident” or “lawsuit.”
- Send cybersecurity questionnaires: Include misrepresentation clauses and require honest answers.
- Include strong contract clauses: minimum insurance, defined breach procedures, and access restrictions.
- Search legal databases: Look for prior issues.
- Require proof of security controls like firewalls, password policies, and cyber insurance.
Contract Must-Haves:
- Fraud prevention provisions
- Minimum insurance standards
- Data return/destruction clauses at contract termination
Real Example:
Target’s 2013 breach came through their HVAC vendor, which had access to internal systems. “They trusted a system that got hacked—and paid the price,” she explained.
Planning for the Inevitable: Incident Response
Planning for the inevitable is crucial because it’s not a matter of if but when you’ll face a breach.
Prepare Your Toolkit
- Print your cyber insurance policy.
Don’t rely on digital access if your systems are locked down. - Know your first call.
Call legal counsel before the insurance company to preserve attorney-client privilege. - Have pay and backup schedules printed.
Imagine being hit the night before payroll, you’ll need offline access to keep business running. - Train your staff.
Train staff not to turn off devices during incidents; instead, disconnect from the internet.
Emerging Threats to Watch For
Cookie Theft and MFA Bypass – Cookies store authentication tokens; if stolen, they can bypass MFA. Sarah and TKS recommend disabling “remember me” features entirely.
Corrupted Document Attacks- Hackers now send slightly corrupted Word files that bypass email filters. Once opened, they auto-correct in Word and include malicious links.
Bonus: Sarah’s Top 3 Must-Have Tools
- Multi-Factor Authentication (MFA)
- Secondary, offline backup system (e.g., Backblaze + Dropbox)
- Endpoint Detection and Response (EDR) like CrowdStrike or SentinelOne
Practical Advice from a Cyber Law Veteran
Sarah closed with some great advice:
“Employees are your greatest asset—and your biggest risk. Train them, guide them, and protect yourself from their mistakes with smart policies.”