Cyber security news for all

More

    3 great myths about cybersecurity and what you need to know

    Imagine when a woman walks through the front door to tell you that she had just been in a car accident, that she was working at the front desk of a tech company. You ask if there is anything you can do that can help, but she says it doesn’t matter and asks if you can take her to the bathroom.

    Later, you discovered that the woman had inserted a flash drive into an unattended computer and infected their entire business system with destructive forms of malware. This weird, well-designed situation is a demo (hosted by a cybersecurity professional I know). It shows employees that not all network attacks are carried out remotely.

    Misunderstanding 1: The cybersecurity team will protect me.

    Many employees think they are not special, so they delegate the job of protecting themselves and the business to others. However, when each employee uses multiple connected devices and hackers increasingly target people across the company, there is no excuse.

    Misunderstanding 2: IT specialists will not be fascinated by cyber attacks.

    Many companies believe that a well-trained IT team is all they need to protect themselves from cyber attacks, but that’s another damaging myth. As Boldin explains, “Even professionals are vulnerable to social engineering attacks. People will always look for simple ways to do things, including IT professionals. Multitasking and everyone’s security will not always be our full focus.”

    That is why Boldin recommends “continuing education” for the entire company. Not just annual compliance training, which he calls “the new standard.”

    He believes that frequent and continuous “hands-on training” is the most effective way for companies to maintain security.

    Misunderstanding 3: Cyber ​​attacks are limited to the digital world.

    The scene at the beginning of this article is indeed very incredible. However, once we return to the office, we must remember that physical security is a key part of any powerful network security platform. Causes of many of the major vulnerabilities are strategically placing flash drives, laptop theft, or other forms of physical penetration.

     

     

     

     

    Recent Articles

    Russian Cybercriminal Behind “Cardplanet” Site Sentenced

    According to the United States Department of Justice, a Russian cybercriminal, Aleksey Burkov, 30—who operated Cardplanet site: a site that trafficked stolen card details—has...

    Hackers Used Malicious Docker Images to Mine Monero

    Researchers found malicious images on Docker Hub used for crypto mining. Palo Alto Networks' Unit  42, unraveled a crypto mining scheme which uses malicious Docker...

    NSA outlines requirements for secure collaboration services for US government telework

    The new National Security Agency (NSA) guidelines are a window of security for users. Everyone has been trying to return to their lives since...

    Cybercriminals threaten to sell off “scandalous” files swiped from Mariah Carey, Nicki Minaj, Puff Daddy’s legal eagles

    There's no escaping these cybercriminals. In a recent case of "cyber-extortion," threat actors known as REvil, are threatening to expose celebrity "dirt." These threat actors...

    Twitter apologises for exposed customers data

    In what is described as a "data security incident," sensitive details of Twitter's customers were exposed. Unlike other cases of a breach which are...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox