Skip to main content

Are You Prepared Against Cyber Threats?

Methods for Easing Your Top Cyber Security Challenges – Channel ...

What is the worth of information Security in 21st century? Imagine small or medium scale business having around 2500-4000 employees working. What if there is a data bridge of small or medium scale compony? Information carries by Venture are employees’ names, Address, Banking Forms, Tax forms which also includes Social incurrence Number and their dependents names and supporting information which may be sell or used for personal blackmails by intruders which was kind of storyline of Scotty’s Holdings data bridge[1]. Main base of this data bridge was email phishing which were send to all over compony employee pretending to be CEO. Which contains Employer identification number (EIN), Employer’s name, address, and ZIP code, Wages, tips, other compensation and many more fields. But it’s not the first or last compony to be a part of Email phishing Attack. Main purpose of Email Phishing scams is stealing banking credentials or any other form of credentials.

Preventions Employer and Employees should take care to avoid Email Phishing attack over there compony are as follow. There should always basic awareness training provided to employees showing some sample of phishing email. However, Story doesn’t end their employers need to install auto email filters and spam detector which decrees the impact rate. As email filters engine reads subject like “You won’t believe what I’ve found” or “Invoice of Goods and Services” Which will automatically be filtered out. If not, then employees should always double check with certain department in-person. Logs of Email Servers should always be subjected. Every broadcast and forwards should be approved by authorities or limited to certain number under province privacy act. During the training employees should educate on how to handle technology by showing some validations techniques to identify trustworthy sources and fraud sources. There should always guidebook handed to each employee regarding prevention of most occurring cyber Threads.

Subcategory of phishing Attack is claiming first copy of website to be legitimate website. To Avoid or spread awareness among the employees, Employer regularly does the cyber-attack seminar which should spread awareness how to detect legitimate website. Some of the golden rule is always check for homograph of website, Identify the partner of compony, Check for the certificates which should match organizational details and lastly, look for source of the link.

Every Assert should be logged including the network traffic and unattended device logged in session. Use third party or own login record keeper software to take track of the user of certain computer. Software should always have support to access unattended device using master credentials. However, Application should also support creation of certain level of user which should have limited access. For example, Data analysist should not have access to HR Admins rights to view the depth of data of each employee. Each employee should remember device credentials or store using some password keeper like 1Password, KeePass, LastPass and many other which reduces the forgot password request which the angle is used by intruder to perform phishing mails.

Social engineering is form of gathering information of victim which may be used for guessing password or getting into the system. Phone Phishing for Compony Information which can be prevented by educating employees by telling to install call detector like Truecaller. Such application will block the most common scammers phone number.

Due to the Firewalls and other defense techniques, Attacker can’t execute attack from outside of network so to secure this endpoint. Unauthorized personnel following employees into restricted area should be limited by following certain rules. Every single assert should be only accessible by RFID Card, PIN Code or Bio-metric reader. Internal network should be having cluster designed. There should always video surveillance installed all over the Campus. Every Visitor should have access card with limited authority.

“Do you think is this the end of learning of cyber threats?”

Answer is BIG NO. Employer should always encourage employees to updated on Information Security.


Credit:

Charvik Patel



[1] https://fox59.com/news/every-scottys-brewhouse-employee-affected-by-data-breach-scammer-gets-copy-of-all-w-2-forms/



Comments

  1. It is very interested topic keep putting nice content like that great work it is very useful for professionals

    ReplyDelete
  2. All the very best for this work.

    ReplyDelete
  3. Great Information about Cyber Threat. And also other information as well. Thanks guys for the information through you Informative site. Awesome website with great Information.

    Hope for more and more information.
    Good Luck guys !

    ReplyDelete
  4. Very good and nice content. It will help the people to protect from the cyber threats. Fantastic work team and wonderful work.

    Thanks

    ReplyDelete
  5. Nice article about cyber security. I would love to read another great articles like this. Keep the good work.

    ReplyDelete
  6. Nice work. Such a wonderful article on Cyber threats.

    Keep it up guys !

    ReplyDelete
  7. Very nice..... I really like your blog😍

    ReplyDelete
  8. Best Aritical on Cyber Threats
    Great Job.

    ReplyDelete
  9. Very good, This information is essential and informative which you have shared here. Read more info about AML Software south africa. It is beneficial for beginners to develop their knowledge. It is very gainful information. Thanks for share it.

    ReplyDelete

Post a Comment

Thanks

Popular posts from this blog

Emotional and Psychological Trauma

What is Emotional and psychological trauma ? Emotional and psychological trauma is any stressful event that occurs in a lifetime that makes you struggle with your emotions, memory,different activities and make you feel helpless and hopeless in this ruthless world. The event may not be objectively scaled it is a subjective sensation about a event and every individual respond differently to the event . For example a death in a family due to accident due to an pothole makes one dad react positively and he goes on to correct every pothole of the city and some other may react it negatively Emotional and psychological trauma can be caused by: In Indian scenarios emotional and psychological trauma can be caused by accident,disasters, sexual assault that may have occurred at any course of life Ongoing family issues, neighbourhood problems , continues rejection from various interviews , household violence , neglect, low performance at school or institution, contin

Office of the Personnel Management (OPM) Data Breach: A Case Study

WHAT HAPPENED IN THE OPM DATA BREACH      As the relationship between humanity and technology develops, an emergent area of concern lies in the security of the information ferried over and handled by this technology. A myriad of information security and data breaches reported upon by news media in the recent past has had the simultaneously fortunate and unfortunate effect of bringing information and network security into the public consciousness. One such incident was the United States (US) Office of the Personnel Management (OPM) data breach.      While there are many aspects of the OPM data breach that are notable, chief among them is that the perpetrator of this data breach has been widely attributed to China. As China increases its economic clout and develops its technological capabilities, its international presence is becoming more and more pronounced—and not always in the best light. Sanger (2018) has noted that by 2009, Google executives had noticed state-sponsored