Cybersecurity Awareness: Simple Actions To Dial Up Digital Defences

The traditional 9-5 working day at the office now seems like a hazy memory from a very distant past. In its place, we find ourselves in an ‘always on’ digital world with hybrid or work-from-anywhere practices now a cemented fixture in day-to-day life. 

Our lives have shifted at enormous speed and against those shifting sands, hackers have revealed their many faces.  

Today, hackers have ramped up operations, with an increasingly targeted and complex bag of tricks. The figures alone highlight the scale of the challenge. Every day 450,000 new pieces of malware are detected, and 3.4 billion phishing emails hit inboxes across the globe. 

If there’s one key takeaway from this new state of play, it’s that awareness, vigilance, and education are vital weapons and our most critical first line of cyber defence. To get ahead of the challenges, each of us, whether at work or play, has a n important role in our collective safety online. The ball now lies firmly in our court, so what are the core threats we need to tackle, and what simple actions can dial up digital defences? 

Ransomware 

Ransomware is a type of malware. Like other types of malware, it commonly infects your computer when you open an infected email attachment or click on a malicious link. It takes over the data on your computer, usually encrypting it. You receive a notice that you can no longer access your data until you pay a ransom. Cyber criminals may also threaten to publicly release your data if you don’t pay the ransom.

What are the best ways to protect yourself?

  • Be suspicious of any urgent messages pressuring you into clicking a link, installing software, or opening an email attachment.
  • Make sure you are running the latest version of anti-virus software.
  • Make sure the operating systems, programmes, and apps you use are always updated and current.

Phishing Indicators 

Email phishing attacks attempt to infect your computer, steal your passwords, fool you into sharing sensitive data, and more. After clicking on a link or opening an email attachment, you are asked to enable various permissions to access your account or system. While phishing attacks often have different goals, they share many of the same tell-tale signs.

What should you look for to keep yourself off the phishing line?

  • Always beware of an email using an enormous sense of urgency, often using fear or demanding “immediate action.” These emails are attempting to rush you into making a mistake.
  • Someone pressuring you to bypass or ignore our security policies and procedures. Requests for highly sensitive information, such as your credit card details, banking information, or passwords.
  • An email that appears to be from a person you know, but their tone of voice or email signature seems odd or strangely worded.
  • An email that creates a strong sense of curiosity or enticement, perhaps even an offer for something that is too good to be true.
  • An email with a generic greeting such as “Dear Customer,” or has numerous spelling or grammar mistakes.

Passwords

We all want to protect information, and that often starts with a secure password. 

What are the best ways to keep your passwords safe?

  • Make each password long and strong. The more characters in your password, the stronger it is.
  • Use multiple words to create a passphrase, such as “Don’t forget to stand” or “stopping- woods-snowy-evening”.
  • Create a unique password for each account. If you can’t remember them all, ask if you can use a password manager.
  • Keep passwords a secret. Never share them with anyone, including a supervisor.
  • Never use public computers to log in to your online accounts.
  • Use two-step verification whenever possible

What Does This All Mean?

People are at the heart of the cybersecurity solution. Whether at work, rest, or play, all of us are more likely than ever to be attached to one or more digital devices.

While these devices bring convenience and opportunity, they also bring considerable risk. Securing our digital lives with a few key tips helps reduce the risk so we can enjoy the benefits of our digital age. Now, more than ever, we need to be prepared for anything and everything, so let’s not wait until there’s an emergency to take action. 

Contributed by SANS Institute:

You Might Also Read:

The Do’s and Don’ts Of Security Risk Management:

 

« The Role of Zero Trust Architecture In Minimising Cyber Risks
The Hidden Costs Behind Black Friday Bargains »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.