Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Invest in Cyber Awareness to Prevent Attacks
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Invest in Cyber Awareness to Prevent Attacks

4 years ago Tripwire Guest Authors
Invest in Cyber Awareness to Prevent Attacks

Today’s cyber threat landscape is extremely challenging. Ransom this, ransom that, ransom everywhere – information technology (IT) professionals must work to protect organizations against the next big ransomware attack. Over the years, the sophistication of ransomware attacks has increased as well as the amount of money demanded and paid out in exchange for the ransom-held information. This is why it is extremely important that organizations equip their employees with the knowledge and awareness necessary to identify activities that lead to such attacks. 

Cybersecurity Awareness

Preventing and responding to ransomware attacks require an awareness of ransomware threat vectors as well as a people-processes-technology approach to mitigating associated risks. Employees must understand how to detect and avoid common attack vectors. This requires strong cybersecurity awareness and training. As part of the training, employees should be presented with a policy that instructs them to:

  • Identify and avoid common attack vectors (e.g., phishing attempts)
  • Delete suspicious emails containing links
  • Avoid visit malicious websites

There’s some evidence that United States employees may lack knowledge of the increase in ransomware attacks as well the more damaging and destructive nature and scope of the attacks. In June 2021, Armis reported the results of survey responses for over 2,000 respondents from across the United States. Based on the findings, it was evident that end users are not paying attention to major cybersecurity attacks plaguing operational technology and critical infrastructure across the country, signaling the importance of businesses prioritizing a focus on security as employees return to the office. The report included findings in the following four areas:

  • Education and Awareness of Cyberattacks
  • Severity and Lasting Impact of Attacks
  • Attacks that Target Healthcare
  • Bring Your Own Device (BYOD)

The results indicated that respondents were unaware of the most recent and damaging cyber attacks despite the news headlines and attention given by the media, noting that over 21% of respondents were unaware of the Colonial Pipeline cyberattack. Regarding the long-term impact of the attack, 24% of respondents believed that the incident would not have any long-lasting effects on our nation’s fuel industry. The survey also looked at the use of employee personal devices to perform work for their employer and learned that

  • 26% of the companies do not have any policies in place to secure both work and personal devices,
  • Over 71% of employees intend to bring their work-from-home (WFH) devices back to the office, and
  • 54% don’t believe their personal devices pose any security risk to their organization. 

Human Factor

The human factor plays a large role in identifying, or failing to identify, cyber incidents. Humans are also instrumental in reporting the incidents. Therefore, organizations must invest in training their workforce on how to identify and report a suspected incident. As such, focusing on training and preventing the most common sources of malware infection is encouraged. Simply installing anti-virus software on employees’ computers is not enough. Their behaviors are key to protecting against malware infection. Why? Because in today’s highly organized cyber-criminal world, there are entire organizations dedicated to continually developing malware that cannot be detected.

Organizations must also invest in implementing best practices that focus on preventing a malware infection such as regular vulnerability scanning to identify and address vulnerabilities, patching and updating software, as well as ensuring that devices are properly configured and that security features are enabled.

Conclusion

In addition to effective cybersecurity awareness and training (e.g., training people to identify phishing attacks), the use of technology can greatly mitigate risks. For example, security configuration management (SCM) and file integrity monitoring (FIM) are tools that automate maintaining secure configurations. While SCM notifies and offers detailed remediation instructions in order to bring a misconfigured system back into alignment, FIM is a technology that monitors and detects changes in files that may indicate a cyberattack. As businesses invest raising awareness of cyberattacks, both of these tools will help organizations protect against them. 


About the Author: Ambler is an attorney with a background in corporate governance, regulatory compliance, and data privacy. She currently consults on governance, risk and compliance, enterprise data management, as well as data privacy and security matters in Washington, DC.  

LinkedIn: https://www.linkedin.com/in/amblertjackson/

Twitter: @amblerjackson

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Invest in Cyber Awareness to Prevent Attacks” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Critical Severity, Encryption, Finance, Malware, Phishing, Privacy, Ransomware, TripWire

Continue Reading

Previous What You Need to Remember When Choosing a Managed Service Provider (MSP)
Next Palo Alto Warns of Zero-Day Bug in Firewalls Using GlobalProtect Portal VPN

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT