Examples include phishing and ever-intensifying campaigns in this area, intrusions into the cloud environment, and we must not forget the IoT (Internet of Things), devices which are often without basic security features and settings.
Each company should pay sufficient attention to the regular reassessment of technological infrastructure risks. This process will help identify potential problem areas and define ways to deal with them. This process has several steps:
Despite the increasing number of attacks on cloud services, cloud storage can be considered one of the most secure. The attackers usually do not target a cloud service provider and its infrastructure. The greatest risk comes from users of cloud services, which is associated with a lack of understanding of the cloud environment and the associated insufficient or poor configuration.
The conditions for sufficient data protection in the cloud are, firstly, well-trained environmental administrators who know how to set up security mechanisms and configurations to protect data while allowing access to authorized users. Second, sufficient encryption of the data stored in the cloud and management of their encryption keys. And third, it is the segregation of duties in managing such an environment.
Do not forget the multifactor authentication (MFA), which provides a second layer of protection and significantly increases the strength of authentication above the level of a common password. The use of multifactor authentication significantly reduces the risk of unauthorized login if the user’s password is compromised.
If, for any reason, you have postponed replacing hardware or updating software for any reason, do so as soon as possible and set up a regular update process and hardware lifecycle. Older devices and programs have protection at the installation or last update level. Such hardware (such as firewalls and routers) and software may not provide the necessary protection against current threats.
It is also important to regularly check the security software installed on all end devices. The best way is central management to ensure that each client has the latest update.
Does your company policy allow employees to use their private devices to remotely access company data? If so, you should change it as soon as possible. Each such device carries a risk because its protection is not managed by your organization and can therefore hide various vulnerabilities (such as device settings or malware protection) that can lead to an attack on your corporate network through such a high-risk device. Provide employees with business equipment such as laptops, smartphones, or tablets. This allows you to fully control what has been installed on the device, including security software. It is important to ensure that users do not have local administrator privileges on these devices that allow them to change settings or install unapproved software.
Due to the pandemic situation, many companies needed to find quick solutions that allowed employees to work outside the office and access the files they needed to work. This could also be one of the causes of the growing number of cyber attacks. The ideal solution to this situation is to implement a VPN that will allow a secure connection to the corporate network. In this way, you encrypt the communication and make it unreadable to a potential attacker. Deploying this technology will also allow you to implement MFA as an additional layer of protection for your corporate IT infrastructure.
Implementing measures against ever-evolving cyber threats can be a challenging task even for large IT teams. If you are a small business, this may seem like an impossible task. However, this should not discourage you. In such a case, it is rather necessary to look for a reliable partner who has experience and can provide cyber security as a service. This approach will allow even the smallest company to prioritize its business and leave cyber security to experienced professionals. Available trends suggest that the frequency of attacks on computer systems will only increase in the coming period. Therefore, the question is not whether your computer system will be attacked, but when it will happen. In a situation where your security depends on IT, there are only two things that increase your chances of resisting an attack. These are properly set up cyber security processes and sufficiently applied technical measures to protect your computer systems.
Daniel Suchý, Cyber Security Specialist, Aliter Technologies, a.s.
Even the most technologically advanced application will not protect us from the greatest threat that is there – us.
The popular app WhatsApp will share sensitive information with Facebook. A wave of criticism arose.
Once again we supported as a partner the biggest conference in the IT sphere in Slovakia
Our Security Specialists Filip Mikuš and Jakub Obetko represented Aliter Technologies at the SecTec Security Day 2018 with a presentation focused o...