First of all, Happy New Year! We wish you a safe and secure 2016.
We kick off this year with an article written by one of our speakers on the 6th Annual Cyber Security Summit in Prague. Milica Djekic is a Cyber Security Researcher writing for several magazines such as Journal of Computer Sciences and its Applications, Cyber Defense Magazine and Australian Security Magazine.
During her session entitled “Employee Education & Social Engineering” she will discuss the most challenging aspects of an online work environment. She will also share some insights into measures of protection and security in order to overcome common Cyber Security threats.
Enjoy Milica’s article below.
Common practice shows that there are a few main Cyber Security scenarios in which misuse of data occurs:
- The information could leak out via communication and information exchange channels such as messengers, chat tools or social media messaging systems.
- The information could also be at risk if different types of email accounts are used. It’s possible that someone could track your correspondence or even login to your account if the access details are previously obtained.
- Finally, many employers use different types of business management software which are usually the cloud-based ones, including cloud-based project management applications, some task organizers and other scheduling or productivity related programs.
How Safe is the Cloud?
What the majority of these applications have in common is that they are mostly based on cloud technology. It’s clear that if someone is supposed to obtain their business tasks remotely, the main requirement would be to do such activity online. It’s therefore that companies often use a variety of web-based tools. In such case, all you need to know is a user’s username and password in order to login into their cloud environment. Many studies suggest that cloud-based systems are far from being secure; primarily because most solutions do not have a properly developed access control option.
Train and Educate your Staff
Confidential information could leak out through carefully prepared hacking campaigns and that’s definitely a scenario when many user accounts could be threatened. It’s not a rare case that the entire business suffers the devastating consequences of those hacking attacks by means of financial losses and reputation harm. In any case, the employer should invest into a best Cyber Security practice and provide periodical education and training to its employees so they can learn to follow their procedures and act skillfully in a cyber environment.
The Insider Threat
There is another risk to a company’s Cyber Security. It’s called an insider threat. Common practice shows that many employers that operate in an outsourcing manner and hire a home-based labor force are not paying enough attention to their recruiting selection criteria. For instance, a growing number of companies from the developed world see advantages in employing a working force from a developing region, believing that it’s the best opportunity to cut salary costs and maximize profits. This can however bring certain risks. The reports show that the majority of developing countries worldwide still struggle with quite a high level of corruption within their societies. In such an environment you often come across criminal networks that seek to hire an insider that would corrupt the company from inside.
Are you interested in learning more about social engineering and ways to counter these threats? Make sure to join Cyber Security Summit 2016 in Prague this spring and to take part in Milica’s session.