Tag: cybersecurity

  • How to Achieve Strategic Cyber Risk Management With NIST CSF

    Keeping sensitive data and critical tech safe from cyberattacks is crucial for businesses like yours. Your survival and growth depend on how well your organization can withstand cyberthreats. That’s where cyber risk management comes into play.

    Businesses with solid cyber risk management strategies can build formidable cyber defenses and reduce risks without compromising business growth. Besides enhancing security, it also ensures your business stays compliant.

    In this blog, we’ll share the core principles of cyber risk management and show you how integrating it with a simple but effective security framework can help you achieve strategic success.

    Key characteristics of risk-based cybersecurity

    Risk-based cybersecurity helps organizations focus their efforts and resources on the most critical risks. This approach aims to reduce vulnerabilities, safeguard what matters most to you and ensure you make informed decisions.

    Here are the key characteristics of risk-based cybersecurity:

    Risk reduction: By proactively identifying and neutralizing threats, you can reduce and minimize the potential impact of a cyber incident.

    Prioritized investment: By identifying and assessing risks, you can concentrate your investment efforts on areas that need your attention most.

    Addressing critical risks: Dealing with the most severe vulnerabilities first can help you strengthen your business security.

    Cyber risk management frameworks

    Cybersecurity risk frameworks act as a guide that helps businesses achieve the full potential of a risk-based approach. Here are several ways frameworks can help you enhance your current cybersecurity posture:

    • Frameworks take away the guesswork and give businesses a structured way to assess their current cybersecurity posture.
    • Frameworks help organizations systematically focus their investments on addressing the most critical and relevant risks.
    • Frameworks provide organizations with the right guidance that helps build security, which is crucial for building customer trust.
    • Frameworks are built using controls that have been tried and tested. They essentially help businesses implement effective security controls.
    • Frameworks are designed to help organizations achieve compliance with government and industry regulations.

    NIST cybersecurity framework

    The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) is a popular, user-friendly framework that empowers business leaders like you to boost organizational cybersecurity. Think of it as a valuable tool created by top security experts to help you protect and secure your digital assets.

    Here’s how the NIST CSF supports a risk-based approach:

    • It helps you understand your risk by identifying what is most valuable to you.
    • It gives you a high view of people, processes, technology, information and other business-critical aspects that need to be secured from threats so your business can operate successfully.
    • It helps you prioritize your risks based on their impact on your business.
    • It helps you allocate your resources where they matter most and ensures you maximize your investment.
    • It promotes continuous monitoring and helps you adapt to evolving threats.

    Secure your future

    Safeguarding your business from cyberthreats is critical for the survival and growth of your business. Don’t leave your business security to chance. Consider partnering with an experienced IT service provider like us. Contact us now!

    Download our infographic, “Assess Your Cyber-Risks in 7 Critical Steps,” and strengthen your defenses against lurking cyber dangers.

  • Four Ways Disasters Fuel Cyberattacks

    Your business, in all likelihood, already faces numerous challenges in today’s tech-driven world. However, the aftermath of an unexpected disaster can push your organization to breaking point. This unintentionally creates opportunities for cybercriminals to launch devastating attacks, amplifying the chaos caused by such events.

    Disaster preparedness should be a top priority for your business — not only for physical resilience but also for fortifying your digital defenses. By understanding how disasters fuel cyberattacks, you can proactively safeguard your business against these deceptive threats.

    Understanding how disasters amplify cyberthreats

    Let’s look at four major ways disasters amplify cyberthreats and what strategies you can utilize to bolster your cybersecurity posture in the face of adversity.

    Leveraging diverted attention and resources
    When a disaster strikes, the immediate focus shifts toward safety and recovery. Unfortunately, this diverts attention and resources away from maintaining and protecting your IT systems and networks.

    With a reduced emphasis on cybersecurity measures, essential updates and monitoring may be overlooked, leaving your networks vulnerable to intrusion. Cybercriminals seize this opportunity to infiltrate your systems, compromise sensitive data and disrupt your operations.

    To tackle this situation, establish a dedicated team responsible for monitoring and maintaining cybersecurity, even during times of crisis. Implement automated security systems to scan for vulnerabilities and apply necessary patches continuously. By ensuring cybersecurity remains a priority, even in challenging times, you can minimize the risk of cyberattacks.

    Exploiting fear, urgency, chaos and uncertainty
    Disasters create an environment of fear, urgency, chaos and uncertainty — prime conditions for cybercriminals to thrive in. They launch targeted attacks, such as deceptive emails or fraudulent websites, capitalizing on the sense of urgency and the need for quick solutions. By manipulating individuals into disclosing sensitive information, cybercriminals gain unauthorized access to critical systems.

    To combat this, educate your employees about the tactics used in phishing attacks and social engineering scams. Train them to recognize warning signs, such as suspicious emails or requests for sensitive information. Encourage a culture of skepticism and verification, where employees double-check the authenticity of requests before sharing confidential data.

    By fostering a vigilant and informed workforce, you can fortify your defense against cybercriminals seeking to exploit fear and uncertainty.

    Damaging critical infrastructure
    Disasters can cause severe damage to your critical infrastructure, compromising components integral to your cybersecurity measures. Destruction of servers, routers or firewalls can weaken your defense mechanisms, allowing cybercriminals to exploit security gaps.

    To address this challenge, ensure your critical infrastructure has backup and disaster recovery in place. Regularly back up your data, store it securely off-site or in the cloud, and test the restoration process to ensure it functions smoothly. Implement robust disaster recovery and business continuity plans, including provisions for cybersecurity.

    By maintaining resilient infrastructure and regularly testing your backup and recovery processes, you can mitigate the impact of infrastructure damage on your cybersecurity.

    Impersonation and deception
    In the wake of a disaster, cybercriminals often exploit the trust associated with relief organizations and government agencies. By impersonating these trusted sources, they deceive victims through phishing emails, messages or calls, tricking them into divulging sensitive information or engaging in fraudulent transactions.

    To protect yourself from such scams:

    • Encourage your employees to verify the authenticity of any communication received during a disaster.
    • Advise them to independently contact the organization or agency through known, trusted channels to confirm the legitimacy of any requests.
    • Establish robust security awareness training programs that educate employees about common impersonation tactics and teach them how to report them effectively.

    By promoting a culture of caution and verification, you can defend against impersonation and deception tactics used by cybercriminals.

    Act now to safeguard your business

    Now that we know how cybercriminals can target your business during a disaster, prioritizing disaster preparedness and implementing the above-highlighted measures are important to navigate today’s ever-evolving technology landscape.

    If you need expert guidance, we’re here to help fortify your disaster preparedness and cybersecurity efforts. Together, let’s ensure a resilient and secure future for your business. Contact us today to proactively safeguard what you’ve worked so hard to build.

     

  • 3 Steps to Zero Trust Cybersecurity for Small Businesses

    Cyberattacks have become rampant and have also grown in sophistication. A simple lapse in your network security could lead to a chain of events that could prove catastrophic for your business. You can avoid this by implementing a robust cybersecurity framework such as zero trust.

    Zero trust asserts that no user or application should be trusted automatically. It encourages organizations to verify every access while treating every user or application as a potential threat. Zero trust is a great starting point for businesses that want to build formidable cybersecurity. It can not only adapt to the complexity of the modern work environment, including a hybrid workplace, but also protect people, devices, applications and data irrespective of where they are located.

    However, zero trust should not be mistaken for a solution or a platform, regardless of how security vendors market it to you. You can’t just buy it from a security vendor and implement it with a click of a button. Zero trust is a strategy — a framework that needs to be applied systematically.

    Implementing zero trust: Three core principles to remember

    As you begin your journey to implement a zero-trust framework to bolster your IT security, there are three core principles that you must remember:

    1. Continually verify
    You should strive to implement a “never trust, always verify” approach to security by continuously confirming the identity and access privileges of users, devices and applications. Consider implementing strong identity and access (IAM) controls. It will help you define roles and access privileges — ensuring only the right users can access the right information.

    2. Limit access
    Misuse of privileged access is one of the most common reasons for cyberattacks. Limiting access ensures that users are granted minimal access without affecting their day-to-day activities. Here are some common security practices that organizations have adopted to limit access:

    • Just-in-time access (JIT) – Users, devices or applications are granted access only for a predetermined period. This helps limit the time one has access to critical systems.
    • Principle of least privilege (PoLP) – Users, devices or applications are granted the least access or permissions needed to perform their job role.
    • Segmented application access (SAA) – Users can only access permitted applications, preventing any malicious users from gaining access to the network.

    3. Assume breach and minimize impact
    Instead of waiting for a breach, you can take a proactive step toward your cybersecurity by assuming risk. That means treating applications, services, identities and networks — both internal and external — as already compromised. This will improve your response time to a breach, minimize the damage, improve your overall security and, most importantly, protect your business.

    We are here to help

    Achieving zero trust compliance on your own can be a daunting task. However, partnering with an IT service provider like us can ease your burden. Leverage our advanced technologies and expertise to implement zero trust within your business — without hiring additional talent or bringing on additional tools yourself.

    Download our infographic “Why Now Is the Time to Embrace Zero Trust” to learn actionable steps you can take today to build a solid zero trust security framework. Contact us for a no-obligation consultation.

  • Be Aware of These Top AI Cyber-Risks

    Our third installment for Cyber Security Awareness Month focuses on the benefits and risks of AI.

    The rise of AI has sparked a revolution. Everyone, from industry giants to smaller enterprises, is captivated and eager to leverage AI’s endless possibilities.

    However, amid the celebrations of AI’s merits, let’s not ignore its potential risks. A new array of cyberthreats emerges when intricate AI algorithms cross paths with malicious cyber elements. From AI-powered phishing schemes to ultra-realistic deepfakes, these dangers serve as a reminder to stay vigilant and prepared.

    In this blog, we embark on a journey to explore AI benefits and risks. Our aim is to guide you in harnessing AI’s strengths while safeguarding against its potential pitfalls.

    AI’s positive impact on business

    The top benefits of AI include:

    Smart data analysis
    AI’s expertise lies in swiftly deciphering massive data sets to uncover patterns. This ability proves invaluable in traversing through modern markets. The insights derived empower you to make well-founded decisions, steering clear of guesswork.

    Boosted productivity
    AI’s automation prowess liberates your employees from mundane tasks, helping them focus on more critical tasks. Tedious and manual work can now be done seamlessly without human intervention, boosting productivity.

    Faster business maneuvering
    In an ever-evolving technological landscape, keeping up to date is paramount. AI empowers you to process and respond to real-time information promptly. This agility enables swift reactions to evolving scenarios, customer demands and opportunities.

    AI’s cyber challenges

    As we delve into the world of AI, we must also acknowledge the potential risks:

    AI-powered phishing scams
    Sneaky cybercriminals employ AI-driven chatbots to create impeccable phishing emails without the usual red flags, such as grammar errors. These attacks exploit human vulnerabilities, luring even the most vigilant to share sensitive information.

    To bolster your defense, exercise caution with emails from unfamiliar sources. Scrutinize sender details, avoid suspicious links and employ anti-phishing tools for added protection.

    Malicious AI-generated code
    Cybercriminals harness AI tools for swift code generation, surpassing manual capabilities. These generated code snippets find their way into malware and other malicious software.

    Defend against these intricate schemes by educating your team about them. Strengthen your defenses through layered security measures, such as firewalls, antivirus software and automated patch management.

    Deepfakes and impersonations
    AI-generated deepfakes can propagate misinformation, deceiving unsuspecting individuals and leading to fraud or character defamation. For example, in the current era, where many banks rely on online KYC (KYC or Know Your Customer is commonly implemented in banks to comply with regulatory requirements and mitigate the risk of financial crimes), malicious actors can create ultra-realistic videos using another person’s voice and image samples to open accounts for illegal transactions.

    Identifying deepfakes necessitates a discerning eye. Among other factors, anomalies in skin texture, blinking patterns and facial shadows help distinguish genuine content from manipulated content.

    Collaborative path to success

    At the crossroads of innovation and challenges, knowledge takes center stage.

    Our comprehensive eBook, “Protecting Your Business – Navigating AI Safety,” stands as your compass in the AI landscape. Delve into AI’s intricacies, uncover potential pitfalls and acquire strategies for responsible and secure utilization in your business.

    If navigating AI on your own seems daunting, don’t worry. Connect with us for a no-obligation consultation. Together, we’ll navigate AI’s realm, harness its power and ensure your organization’s safety.

  • A Deep Dive Into Phishing Scams

    Phishing scams remain one of the most prevalent and successful types of cyberattacks today, so being aware of the danger they pose to businesses like yours is extremely crucial. Your business could easily be the next victim if you don’t clearly understand how threat actors leverage phishing emails.

    In this blog, you’ll learn the intent behind phishing emails, the various types of phishing attacks, and most importantly, how you can secure your email and business.

    The goal behind phishing emails

    Cybercriminals use phishing emails to lure unsuspecting victims into taking actions that will affect business operations, such as sending money, sharing passwords, downloading malware or revealing sensitive data. The primary intent behind a phishing attack is to steal your money, data or both.

    Financial theft — The most common aim of a phishing attempt is to steal your money. Scammers use various tactics, such as business email compromise (BEC), to carry out fraudulent fund transfers or ransomware attacks to extort money.

    Data theft — For cybercriminals, your data, such as usernames and passwords, identity information (e.g., social security numbers) and financial data (e.g., credit card numbers or bank account information), is as good as gold. They can use your login credentials to commit financial thefts or inject malware. Your sensitive data can also be sold on the dark web for profit.

    Be vigilant and look out for these phishing attempts:

    • If an email asks you to click on a link, be wary. Scammers send out phishing emails with links containing malicious software that can steal your data and personal information.
    • If an email directs you to a website, be cautious. It could be a malicious website that can steal your personal information, such as your login credentials.
    • If an email contains an attachment, be alert. Malicious extensions disguised to look like a document, invoice or voicemail can infect your computer and steal your personal information.
    • If an email tries to rush you into taking an urgent action, such as transferring funds, be suspicious. Try to verify the authenticity of the request before taking any action.

     

    Different types of phishing

    It’s important to note that phishing attacks are constantly evolving and can target businesses of all sizes. While phishing emails are a common method used by cybercriminals, they also use texts, voice calls and social media messaging.

    Here are the different kinds of phishing traps that you should watch out for:

    Spear phishing — Scammers send highly personalized emails targeting individuals or businesses to convince them to share sensitive information such as login credentials or credit card information. Spear phishing emails are also used for spreading infected malware.

    Whaling — A type of spear phishing, whale phishing or whaling is a scam targeting high-level executives where the perpetrators impersonate trusted sources or websites to steal information or money.

    Smishing — An increasingly popular form of cyberattack, smishing uses text messages claiming to be from trusted sources to convince victims to share sensitive information or send money.

    Vishing — Cybercriminals use vishing or voice phishing to call victims while impersonating somebody from the IRS, a bank or the victim’s office, to name a few. The primary intent of voice phishing is to convince the victim to share sensitive personal information.

    Business email compromise (BEC) — A BEC is a spear phishing attack that uses a seemingly legitimate email address to trick the recipient, who is often a senior-level executive. The most common aim of a BEC scam is to convince an employee to send money to the cybercriminal while making them believe they are performing a legitimate, authorized business transaction.

    Angler phishing — Also known as social media phishing, this type of scam primarily targets social media users. Cybercriminals with fake customer service accounts trick disgruntled customers into revealing their sensitive information, including bank details. Scammers often target financial institutions and e-commerce businesses.

    Brand impersonation — Also known as brand spoofing, brand impersonation is a type of phishing scam carried out using emails, texts, voice calls and social media messages. Cybercriminals impersonate a popular business to trick its customers into revealing sensitive information. While brand impersonation is targeted mainly at the customers, the incident can tarnish the brand image.

    Bolster your email security

    Emails are crucial for the success of your business. However, implementing email best practices and safety standards on your own can be challenging. That’s why you should consider partnering with an IT service provider like us. We have the resources and tools to protect your business from cyberattacks, helping you to focus on critical tasks without any worry. Contact us now!

    Meanwhile, to learn how to secure your inbox, download our eBook — Your Guide to Email Safety — that will help you improve your email security and avoid potential traps.

  • Backup Strategies to Prevent Data Loss

    We live in a digital age where data has become one of the most valuable commodities in the world. Businesses collect huge volumes of data every day from their customers, and this data plays a critical role in their day-to-day operations. If business organizations happen to lose their data under any circumstance, the consequences can be quite catastrophic.

    This is the harsh reality of today’s digital business landscape. Businesses can experience data loss in many ways, ranging from natural disasters to cyberattacks. Should you suffer an unexpected data loss, your competitive advantage lies in how quickly you can get your operations up and running without experiencing major downtime.

    In this blog, we’ll take a brief look at the various dangers to business data and how you can prevent them with the right backup. We’ll also look at the different ways of backing up data and the advantages of using a robust business continuity and disaster recovery (BCDR) solution.

    Why Do You Need Data Backup?

    Before we look at the different ways of backing up data, you need to know why your business requires data backup. Businesses commonly encounter the following data security threats to data in their everyday operations.

    • Cyberattacks: As technology evolves, cyberattacks continue to evolve as well. The growing threat of ransomware is a testament to that. According to the latest Verizon report, 27 percent of malware incidents can be attributed to ransomware attacks. While antimalware and antivirus programs can certainly offer protection, businesses need to think about what might happen in case of an unavoidable security breach and eventual data loss when formulating a data security strategy.
    • Natural disasters: Natural disasters such as floods, fire, earthquakes and the like pose a big threat to the traditional form of data storage and security. Do you have what it takes to bounce back if these disasters catch you off guard and wipe out your company’s data?
    • Hardware issues: Mishaps originating from hardware issues play a major role in business data loss. With traditional data storage methods, data is stored in a physical location on hard drives and backup appliances. Any hardware issues arising in these devices can pose a serious threat to your valuable data.
    • Human errors: Human errors still play a major role in data loss. According to Verizon, as much as 30 percent of data loss incidents are caused by internal actors. This could be attributed to anything from poor password practices to falling for phishing scams.

    All these factors indicate that data loss can happen to any organization irrespective of their size or the security precautions they take. What you need is a solid data backup solution to make sure that your lost data is not completely unrecoverable.

    How to Back Up Your data

    As you understand the importance of data backup, it’s inevitable that certain questions may spring to mind – What is the best way to store data? How many copies should you take?

    With regards to the best way of storing data, both cloud backup and on-site backup appliances need to be considered. This is because both have their own advantages and limitations. On-storage devices are faster, giving organizations full control over their data. However, they are prone to physical mishaps and hardware issues. Cloud-based backup, on the other hand, is not vulnerable to natural disasters but requires a lot of bandwidth to backup large files.

    The ideal backup strategy is one that combines both these approaches, with multiple copies stored in different locations. When it comes to backing up your data, you need to consider the 3-2-1 rule, which simultaneously answers your questions on what the right approach to data backup is and the number of copies that need to be made.

    As per this rule, it is prudent to have at least three copies of data – one production copy and two backup copies on two different media (internal hard drive and removable storage media) along with one off-site copy (cloud) for disaster recovery. Newer variations of this rule suggest having at least two copies (3-2-2 rule) on the cloud depending on the importance of your data. Ultimately, the more copies you make, the higher your chances of recovery after a loss.

    Advantages of BCDR Over File-Only Backups

    In crude terms, data backup is simply the process of making copies of your files and storing them. However, the main purpose of a backup is to get your business up and running in no time following an unexpected disaster. Hence, an effective backup strategy is symbiotic with business continuity as well. Business continuity refers to the ability of your organization to get back in working order as quickly as possible following an unexpected data loss.

    When you think about business continuity, you must think in terms of Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO refers to the maximum time an application can be down without affecting the business. RPO refers to the maximum amount of data that can be lost without harming the business.

    A good BCDR solution will provide you with the following benefits:

    • Significant reduction in RTO and RPO
    • Ability to predict business restoration following an unexpected disaster
    • Reduction in downtime and associated revenue losses
    • Lower interruption to critical business processes
    • Avoid compromise to business reputation
    • Ability to customize disaster recovery as per your needs

     

    Best Practices for Data Backup

    While incorporating an effective backup strategy, you need to implement the following best practices to limit data loss:

    • Increase frequency: Digitally-run businesses are required to back up their data multiple times a day. Doing it once a day, at the end of business hours, is no longer sufficient, especially with the number of threats gunning for your data.
    • Use cloud backup: The Cloud has become an indispensable component of data backup in this digital age. Cloud backup comes with a multitude of benefits such as easy recovery, easy scalability, better cost efficiency and more.
    • Use the power of automation: Automation has become a game changer with regards to various IT tasks and backup is no exception. When you automate your disaster recovery process, you can bounce back from serious disasters and continue business operations without suffering too much downtime.
    • Determine your retention span: Retaining all data backup versions forever is not a feasible solution for most small businesses. Due to this, you need to determine the duration for which you will retain your data. This requirement will vary based on your industry, needs and compliance regulations. You need to come up with a solution that ticks all parameters.

     

    To Sum Up…

    Backup should be a part of every organization’s business strategy, irrespective of its size, location or industry. Threats to business data are very real and are happening at an alarming rate. In this scenario, a solid data backup plan could be the preventative measure that saves your business when disaster strikes.

    Talk to us today so we can help you zero in on an effective backup strategy that’s tailor-made for you.

  • Busting 3 Ransomware Myths

    It’s Time to Bust These 3 Ransomware Myths

     In today’s digital age, ransomware attacks are becoming increasingly frequent, sophisticated and costly. With cybercriminals constantly evolving their tactics and targeting businesses of all sizes, organizations like yours must proactively safeguard your data and systems. Unfortunately, many companies fall prey to common ransomware myths, which can leave them vulnerable to attacks and unprepared to respond effectively in the event of an incident.

    In this blog, we’ll debunk three of the most prevalent ransomware myths and provide the accurate information you need to protect your business. Understanding the realities of ransomware and taking proactive steps against it can mitigate the risk and ensure you’re prepared to fight against cybercriminals.

    Top Myths to Bust

    Without further ado, let’s debunk the ransomware myths you should avoid at any cost:

    Myth #1: If my business gets hit with ransomware, I’ll pay the ransom and return to business.
    Many businesses believe that paying a ransom is the quickest and easiest way to recover encrypted data. However, that’s just a dangerous assumption.

    Paying a ransom does not guarantee that the attackers will keep their word and provide the decryption key. Also, paying a ransom only encourages cybercriminals to carry out more attacks in the future.

    The best way to protect your business is to have a solid backup strategy and a comprehensive security plan in place.

    Myth #2: My backups will get me back up and running if I get hit with ransomware. 

    While backups are essential to ransomware prevention, it’s a myth that backups will always save the day. Cybercriminals have upgraded their tactics to compromise backup files as part of their attack strategy.

    With the rise of double extortion attacks, cybercriminals not only encrypt data but also steal it. This means that even if you have a backup strategy in place, your data may still be at risk if attackers threaten to leak sensitive data unless a ransom is paid.

    Myth #3: My antivirus software (or any other security solution) provides complete protection from ransomware attacks. 

    Antivirus software is essential to a comprehensive defense against ransomware, but it’s not enough. Relying on a single security product to defend against ransomware is a mistake. There’s no silver bullet solution to ransomware. However, implementing a defense-in-depth strategy can help your business build the most.

    Partner to succeed

    While it’s true that no security measure is foolproof, taking proactive steps to secure your data and systems can significantly reduce the risk of falling victim to a ransomware attack. We can help ensure your organization is well-prepared to fight against ransomware and other cyberthreats. Feel free to reach out to us for a no-obligation consultation.

    To learn more about ransomware criminals and how to defend your business, download our infographic “The Anatomy of a Ransomware Attack.” It’s a valuable resource that can help you increase your basic understanding of ransomware, identify the signs if you’ve fallen victim and prepare you to defend against these attacks.

  • OneNote Being Used to Spread Malware

     

    With Microsoft disabling macros by default on Office documents, cybercriminals are left needing another means to launch malware that’s victim-supported by default.

    We should expect nothing less of threat actors; when pushed up against a wall with their most powerful asset – Office macros – taken away from them, the most cunning of them will find alternative methods. The challenge for the most sophisticated of cybercriminals is to ensure that the greatest number of potential victims have the application needed that acts as the launcher.

    According to a recent tweet from email security company Prevention Point, a new method involving weaponized OneNote attachments has been spotted in the wild. The initial phish looks relatively standard for a socially-engineered email.

    With the OneNote execution looking somewhere between unexpected (after all, who ever needs to double-click a button within an application to see a supported document?) and sort of brilliant (I would assume that most knowledge workers haven’t interacted frequently with OneNote, so, “maybe this is how it works?”).

    And to boot, the default installation of Office 365 (that is, the software installed on a Windows endpoint) includes OneNote.

    The takeaway here is this is downright dangerous – threat actors have found yet another new way to engage with users in a way that helps move their attack forward with a double-click. This example of the constant evolution of the phish perfectly justifies why organizations need to keep users continually enrolled in security awareness training so that Joe User is always kept up on their toes with security top of mind.

  • Cybersecurity for Employees: Awareness Can Save You from a Breach

    Your company might use iron-clad network protection and implement encryption across the board. However, your data and systems are still at risk of a cyberattack if you aren’t focusing on employee awareness. This risk exists because employees are behind a significant chunk of data breach incidents. These basic steps can help to raise employee awareness and ensure your company is protected.

    Human Error Is a Major Cybersecurity Weak Point for Businesses

    Employee negligence is a major cybersecurity issue for businesses of all sizes. Shred-It’s Ninth Annual Data Protection Report revealed that human error continues to be the driver of most data breaches. Fifty-three percent of C-suite executives cite external human error or accidental loss as primary problems. Twenty-eight percent of small business owners feel the same way. In the report, Ann Nickolas, Senior Vice President of Stericycle, says, “For the second consecutive year, employee negligence and collaboration with external vendors continues to threaten the information security of US businesses.”

    A data breach can have severe consequences when you add up reputational damage and lost revenue. Employee retention can be a problem as well – 33 percent of respondents in the Shred-It survey stated that they are likely to seek employment elsewhere after their employer experiences a data breach. That goes for both breaches of consumer and employee data.

    According to the 2020 Cost of a Data Breach report published by IBM and the Ponemon Institute, the average cost of each lost record is $146. As losing thousands of records during a breach is common, shoring up your employees’ cybersecurity habits is well worth the effort.

    Use this security checklist for in-office and remote employees to figure out what steps your company can take to reduce the risk of a breach.

    1. Train employees to recognize phishing emails

    Email phishing attacks are common. With this type of cyberattack, a hacker sends an email that appears legitimate and asks the recipient to share information or download a file.

    To protect against phishing emails, it’s important to use advanced email protection, which will help to weed out spoof emails and other external threats. Also, make sure all of your employees understand what a phishing email looks like, what the risks are if they fall for one, and what they should do if they spot what they think might be a phishing email message.

    2. Password Security

    A strong password policy is often the first line of defense against cyber attacks, yet many organizations continue to follow outdated guidelines that expose them to significant risk.

    According to Verizon’s 2020 Data Breach Investigations Report, lost or stolen credentials remain the number one hacking tactic used by malicious actors to perpetrate data breaches, with compromised or weak passwords responsible for 35% of all breaches.

    Password Sharing

    While sharing a password might seem convenient and harmless, it can have serious consequences. Passwords should never be shared with others. Period.

    Password Reuse

    Use different passwords for different accounts. That way, if one account is compromised, at least the others won’t be at risk.

    Password Length & Complexity

    Length trumps complexity. The longer a password is, the better. Use at least 16 characters whenever possible. Make passwords that are hard to guess but easy to remember.

    3. Require Multi Factor Authentication (MFA)

    With Multi Factor Authentication, even if a hacker steals an employee’s password, they still will be locked out of their device or system. This is how it works: an employee will use a password and another identifier such as biometric data or a code sent to their email or phone number. Since a hacker can’t steal biometric data and likely doesn’t have someone’s device, as well as their password, their chances of breaking in drop to nearly zero.

    4. Establish a data breach policy

    What an employee does after a suspected data breach will determine how quickly your business recovers. If they don’t act quickly by alerting your IT team, a hacker may have enough time to infiltrate your systems and do extensive damage. With a fast response, it’s possible to lock down your network and mitigate the risks.

    Tell your employees who they should contact if they notice a suspicious email, receive a security alert, if their device is stolen, or if they believe something is amiss with your company’s networks. Also, let them know they won’t be reprimanded if they fall victim to an attack. Employees should know they have their employer’s support. Otherwise, some people may not speak up when there’s a problem.

    5. Discuss mobile device usage

    If employees are using their smartphone or another personal device for work, teach them how to use their devices securely.

    • Always install the latest updates to ensure they’re using the newest operating system. These updates often include critical security updates.
    • If your company isn’t using a virtual private network (VPN), employees need to be very careful about what network they use when accessing business apps remotely. Only log on when using a secure network. They shouldn’t ever use public networks such as those found in coffee shops and airports.
    • Practice good flash drive hygiene – only use company-issued drives. Once one leaves the office, it should be wiped clean or discarded upon return.

    Make Cybersecurity a Part of Your Work Culture

    Following cybersecurity best practices such as using two-factor authentication, avoiding suspicious emails, and practicing good password security can go a long way in protecting against an attack. But, if cybersecurity isn’t a part of your work culture, it’s easy for these best practices to be forgotten.

    Cultivate a cybersecurity-aware culture by openly talking about risks, updating your employees about new best practices, providing training for new employees, and refreshing knowledge with regular internal messaging such as company-wide emails or training meetings.

  • Protect Your Employees Against Vishing

    Cybercriminals are always looking for new ways to scam users. Attacks continue to be more sophisticated and common. Organizations must remain vigilant and understand all the different avenues, including vishing (voice phishing), which uses the telephone as the channel for scamming.

    This post will define what vishing is and critical steps to take to protect your employees from falling prey to it.

    What is Vishing?

    Vishing is a cybercrime that uses voice communication, most often VoIP (voice over IP) phone systems. Cybercriminals use social engineering tactics to attempt to defraud the person on the other end.

    In many cases, these scammers impersonate the government, the IRS, a bank agent, the police, or another trustworthy organization. The content of the call is typically a threat of arrest, bank account closure, or other serious consequences.

    Unfortunately, many fall victim to it, giving in to the demands of the scammer. They may release private information, such as banking accounts, Social Security numbers, or other sensitive data.

    What’s the State of Vishing?

    Vishing grew tremendously in 2020, somewhat as a consequence of remote work. The FBI (Federal Bureau of Investigation) and CISA (Cybersecurity and Infrastructure Security Agency) released a joint advisory on the surge.

    They noted that in mid-July, a vishing campaign targeted various companies through VPN login pages. Actors created phishing pages for the internal VPN login page. They then created employee dossiers with social engineering tactics. The hackers often posed as another employee using spoofed numbers. They advised victims of a new VPN page, which they would send to the targeted employee. When the victim used the fake VPN page, the hacker could gain access to the company’s networks.

    The combination of VPNs and the elimination of in-person verification made these attacks fruitful for many.

    One example was the Twitter breach in July 2020. Hackers were able to hijack 130 accounts of prominent figures. The company admitted that social engineering and phone spear-phishing were the cause.

    Vishing Techniques

    There are several ways that cybercriminals can execute vishing.

    • VoIP: Creating fake numbers is easy for hackers. That can appear to be local or use the 1-800 prefix.
    • Wardialing: This approach uses software to call specific area codes and leave an urgent voicemail claiming that some security issue occurred. In the voicemail, they ask the victim to call back with account information.
    • Caller ID Spoofing: This is similar to VoIP vishing. Cybercriminals use a fake number or caller ID. It could appear as unknown or as a legitimate number, such as the phone number of a trusted government organization.

    These represent the more technologically forward tactics. However, there’s a low-tech way for hackers to get information—from your trash. They can collect vital information if documents aren’t shredded or properly destroyed.

    Now that we’ve covered the background of the topic, let’s discuss prevention

    Ways to Protect Against Vishing Attacks

    There are many ways to protect against cybercriminals that use these tactics. They fall into a few buckets of awareness, technology, and best practices.

    Ensure Every Employee Is Aware and Trained

    Employees are often the weak link in a cyber breach. Vishing is just one more way to isolate them. The best thing you can do is to create a continuous campaign of awareness around cyberattacks. It should be part of your wide-ranging cybersecurity education. Here are some ideas for implementing and maintaining such a campaign:

    • Every new employee should undergo training.
    • All employees should have at least yearly training if not more.
    • IT teams should work with marketing or HR to deliver bite-sized security content. You could distribute this via internal newsletters, intranet sites, or visually with signs and posters.
    • If employees receive a suspicious call, they should have a process to report it to security leaders.
    • Companies should issue advisories to employees about specific scams going on right now, so they’ll be more alert (i.e., scams related to COVID-19 or the IRS around tax time).
    Use Technology to Prevent Calls

    Most organizations employ cloud-based phone systems. Often these platforms have built-in spam caller protection. That’s a good first defense. The technology can detect calls from fraudsters. You then have the chance to either block them or send them to voicemail, so they never get answered.

    Further, phone systems today are often part of a unified communications (UC) platform. There are various security features you’ll want the system to have to protect it from hackers. Having these features in place will mitigate any attack if the hacker successfully gets information from the employee.

    • Advanced firewall systems that prevent intrusions and integrate with VPNs and traffic management
    • Intrusion protection systems (IPS) for detecting traffic that appears suspicious that made it through the firewall
    • DDoS (Distributed Denial of Service) protection
    • Commercial-grade edge routers, which are configured to resist IP-based network attacks
      Regular vulnerability scans
    Other Best Practices to Protect Against Vishing

    There are several other practices to put into place to keep vishing attacks at bay. The use of mobile apps via your UC platform will keep calls routing through your company’s VoIP. Calls won’t come directly to your smartphone number.

    You can also let employees know, especially those working in contact centers, that it’s okay to hang up the phone. If an employee can quickly define the call as vishing, the best thing to do is end the call.

    Finally, be sure you have strict security protocols about exchanging information, especially around accounts or wires. With this as part of your bedrock, employees won’t fall for scams.