• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Back to Basics: Cybersecurity’s Weakest Link

flyytech by flyytech
October 4, 2022
Home Security
Share on FacebookShare on Twitter


Cybersecurity Weakest Link

A big promise with a big appeal. You hear that a lot in the world of cybersecurity, where you’re often promised a fast, simple fix that will take care of all your cybersecurity needs, solving your security challenges in one go.

It could be an AI-based tool, a new superior management tool, or something else – and it would probably be quite effective at what it promises to do.

But is it a silver bullet for all your cybersecurity problems? No. There’s no easy, technology-driven fix for what is really cybersecurity’s biggest challenge: the actions of human beings.

It doesn’t matter how state-of-the-art your best defenses are. Perimeter firewalls, multi-tiered logins, multi-factor authentication, AI tools – all of these are easily rendered ineffective when Bob from a nondescript department clicks on a phishing link in an email.

This isn’t news to anyone

We’ve all heard this before. The fact that humans are a key flaw in cybersecurity strategy is hardly news – or, at least, it shouldn’t be news. But just ask Uber or Rockstar Games whether they thought that their systems were safe from social engineering.

Both companies were very recently breached because a hacker tricked an employee into doing something so against every security best practice that you wonder if the person who got tricked has ever heard any news about IT security.

You might even wonder whether that employee had any cybersecurity training whatsoever.

In both cases, the successful attack didn’t involve a very sophisticated attacker using state-of-the-art tools while exploiting as-of-yet undisclosed vulnerabilities.

All it took was a simple social engineering message – something like, “Hey Bob, I’m from the IT team, and we need to check something on your PC, so I’m sending you a tool for you to run. Just click the link below.”

Yet we’re not learning

Social engineering was a driver for hacking over 20 years ago and, apparently, we still haven’t moved away from it.

Adding insult to injury, successful social engineering isn’t restricted to non-technical organizations.

It’s very plausible that an unsavvy user in a backwater government department might fall for social engineering, for example, but much less so someone working at a leading tech firm – and we see that both Uber and Rockstar Games were impacted by social engineering.

At some point, as a cybersecurity practitioner with the responsibility of educating your users and making them aware of the risks that they (and by extension the organization) are exposed to, you’d think that your colleagues would stop falling for what is literally the oldest trick in the hacking playbook.

It’s conceivable that users are not paying attention during training or are simply too busy with other things to remember what someone told them about what they can click on or not.

However, social engineering attacks have so consistently been in the public news – not just cybersecurity news – that the excuse “I didn’t know I shouldn’t click email links” is getting harder and harder to accept.

Forcefully reinforce the message – that’s your only option

There is no magic solution for the cybersecurity implications of human behavior.

Humans will make mistakes and, as in every avenue in life where humans repeatedly make mistakes, reinforcing education is really your only option.

If tech-savvy companies like Uber and Rockstar Games can get it wrong, then it can happen to anyone else too. The only option you have is to impress cybersecurity best practices on every employee through rigorous educational programs.

And it’s not just users that need educating – you should reinforce these practices in your security team too, by covering patching, permissions, and overall security positioning.

There will always be a risk that a user having a bad day clicks on a link promising that someone in a remote part of the world is trying to give them millions of dollars if they only visit that website.

But, as with every approach to cybersecurity, the focus should be on minimizing and mitigating that risk. Constantly reinforcing and educating is your best defense.

Note: This article is written and sponsored by TuxCare, the industry leader in enterprise-grade Linux automation. TuxCare offers unrivaled levels of efficiency for developers, IT security managers, and Linux server administrators seeking to affordably enhance and simplify their cybersecurity operations. TuxCare’s Linux kernel live security patching and standard and enhanced support services assist in securing and supporting over one million production workloads.





Source_link

flyytech

flyytech

Next Post
Promotion Rejected? Your Record May Not Be the Problem.

Promotion Rejected? Your Record May Not Be the Problem.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

North Korean Hackers Compromise Russian Missile Maker

North Korean Hackers Compromise Russian Missile Maker

August 8, 2023
Noctua Shuffles Roadmap, Adds NH-L9a CPU Cooler for AMD AM5

Noctua Shuffles Roadmap, Adds NH-L9a CPU Cooler for AMD AM5

October 7, 2022

Trending.

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
How to Enable Steam’s Local Network Game Transfer Feature

How to Enable Steam’s Local Network Game Transfer Feature

February 21, 2023
How To Install Tiny11 for Arm64 on Raspberry Pi 4

How To Install Tiny11 for Arm64 on Raspberry Pi 4

February 19, 2023
How To Use Picamera2 to Take Photos With Raspberry Pi

How To Use Picamera2 to Take Photos With Raspberry Pi

September 12, 2022
Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

November 18, 2023

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

How Typosquatting Scams Work | McAfee Blog

Parents: Are Your Kids Ignoring the Danger of Dating Apps?

December 4, 2023
‘Disney Dreamlight Valley Arcade Edition’ reveals more details about the major ‘A Rift in Time’ expansion – TouchArcade

‘Disney Dreamlight Valley Arcade Edition’ reveals more details about the major ‘A Rift in Time’ expansion – TouchArcade

December 4, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT