Cyber security news for all

More

    3 great myths about cybersecurity and what you need to know

    Imagine when a woman walks through the front door to tell you that she had just been in a car accident, that she was working at the front desk of a tech company. You ask if there is anything you can do that can help, but she says it doesn’t matter and asks if you can take her to the bathroom.

    Later, you discovered that the woman had inserted a flash drive into an unattended computer and infected their entire business system with destructive forms of malware. This weird, well-designed situation is a demo (hosted by a cybersecurity professional I know). It shows employees that not all network attacks are carried out remotely.

    Misunderstanding 1: The cybersecurity team will protect me.

    Many employees think they are not special, so they delegate the job of protecting themselves and the business to others. However, when each employee uses multiple connected devices and hackers increasingly target people across the company, there is no excuse.

    Misunderstanding 2: IT specialists will not be fascinated by cyber attacks.

    Many companies believe that a well-trained IT team is all they need to protect themselves from cyber attacks, but that’s another damaging myth. As Boldin explains, “Even professionals are vulnerable to social engineering attacks. People will always look for simple ways to do things, including IT professionals. Multitasking and everyone’s security will not always be our full focus.”

    That is why Boldin recommends “continuing education” for the entire company. Not just annual compliance training, which he calls “the new standard.”

    He believes that frequent and continuous “hands-on training” is the most effective way for companies to maintain security.

    Misunderstanding 3: Cyber ​​attacks are limited to the digital world.

    The scene at the beginning of this article is indeed very incredible. However, once we return to the office, we must remember that physical security is a key part of any powerful network security platform. Causes of many of the major vulnerabilities are strategically placing flash drives, laptop theft, or other forms of physical penetration.

     

     

     

     

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]