{"id":13565,"date":"2023-10-30T10:31:21","date_gmt":"2023-10-30T10:31:21","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-gl\/?p=13565"},"modified":"2023-10-30T10:31:21","modified_gmt":"2023-10-30T10:31:21","slug":"tips-to-stay-cybersafe-this-cybersecurity-awareness-month","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-kh\/blogs\/tips-to-stay-cybersafe-this-cybersecurity-awareness-month\/","title":{"rendered":"Tips To Stay Cybersafe This Cybersecurity Awareness Month"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13565\" class=\"elementor elementor-13565\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-763effe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"763effe\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f4fe46\" data-id=\"6f4fe46\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c002c5 elementor-widget elementor-widget-image\" data-id=\"8c002c5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ivaluegroup.com\/en-gl\/wp-content\/uploads\/2023\/10\/Pink-and-Orange-Gradient-Cybersecurity-Presentation.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a7036 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a7036\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e8203c\" data-id=\"3e8203c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c76a77 elementor-widget elementor-widget-text-editor\" data-id=\"3c76a77\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Most of us can agree that it was a much simpler time back in 2004. Yet, behind the scenes, the seeds were being planted for the increasingly connected world we live in today.\u00a0<\/p><ul><li>In October 2004, there were about 812 million internet users, roughly 12.7% of the world population. That has exponentially risen to 5.54 billion users, a whopping 69% of the world population, in December 2022.<\/li><li>Remember MySpace? Back in 2004, it had reached a million monthly active users, laying the roots for the raging phenomenon we know today as<em> social media<\/em>.<\/li><li>And seeing the increasing prevalence of digital in our lives, along with the inevitable risks that come with it, US Congress deemed the month of October to be known henceforth as <strong>Cybersecurity Awareness Month.<\/strong><\/li><\/ul><p>Fast forward to today, when we\u2019re celebrating this event\u2019s 20th edition and the values it stood for remain as pertinent as ever. Because amid numerous physical conflicts, we often neglect a far more insidious one: us against the seemingly faceless cyber-criminals. Data breaches are becoming increasingly commonplace in our world, and the APAC region is turning out to be a prime target.<\/p><ul><li>The APAC region was targeted in <a href=\"https:\/\/in.newsroom.ibm.com\/2023-02-22-IBM-Report-Asia-Pacific-Felt-the-Brunt-of-2022-Cyberattacks\" target=\"_blank\" rel=\"noopener\">31% of all cyberattacks in 2022<\/a>, in front of Europe (28%) and North America (25%)<\/li><li>The global average in the first quarter of 2023 for weekly cyberattacks an organization faced was 1,248 attacks per week. Just APAC organizations, on the other hand, had 1,835 attacks per week. Oh, and it gets worse for just Indian companies, a staggering 2,108 attacks per week. (<a href=\"https:\/\/blog.checkpoint.com\/research\/global-cyberattacks-continue-to-rise\/\" target=\"_blank\" rel=\"noopener\">Check Point Research<\/a>)<\/li><\/ul><p>So how can you as an organization stay vigilant in this vulnerable environment? Well, it all starts with your employees &#8211; they\u2019re your first line of defence. As it turns out, a human element is the root cause of <a href=\"https:\/\/www.verizon.com\/about\/news\/ransomware-threat-rises-verizon-2022-data-breach-investigations-report\" target=\"_blank\" rel=\"noopener\">82% of all breaches<\/a>.<\/p><p>Let\u2019s begin with something we do every day, yet very much take for granted. We eat, we sleep, we (hopefully) shower, we <em>login <\/em>by entering our password.<\/p><p>\u00a0<\/p><h5><strong>Passwords.<\/strong><\/h5><p>Your employees log onto different accounts daily, and if you\u2019re thinking that them logging onto Instagram, X or their food delivery\/grocery apps has no impact on your business, you\u2019re mistaken. Users often resort to the same easily memorable password across platforms, and if cybercriminals get access to your employee\u2019s Insta credentials, they\u2019re a lot closer to tapping into your organizational data.<\/p><p>\u00a0<\/p><p>So how can you avoid this? There are two routes.<\/p><p>\u00a0<\/p><h5><strong>Route 1:<\/strong> A strong password policy<\/h5><p>\u00a0<\/p><p>Make passwords with at least 12 characters, symbols, numbers, and upper &amp; lowercase letters mandatory. Then, have regular rotation policies for these passwords, with no option to reuse old ones. From your end, have policies that temporarily lock out accounts after a certain number of failed attempts and conduct regular security audits to identify weak or compromised passwords. Ideally, your privileged accounts should have the strongest policies.<\/p><p>\u00a0<\/p><h5><strong>Route 2:<\/strong> Incorporate a password manager<\/h5><p>This is a software app designed to store &amp; manage your employees\u2019 online credentials, with all their passwords stored in an encrypted database and locked behind a master password. So now, instead of having to remember a multitude of passwords, they just need to remember a single, strong one. This significantly reduces the risk of brute force or dictionary attacks.<\/p><p>So, we\u2019ve got passwords covered, but what if your employee has written it down somewhere like a journal or a spreadsheet and cybercriminals have somehow gained access to this? In isolation, passwords aren\u2019t enough. That\u2019s why we have multi-factor authentication (MFA)<\/p><p>\u00a0<\/p><h5><strong>Multi-Factor Authentication<\/strong><\/h5><p>\u00a0<\/p><p>This is an authentication mode requiring users to provide two or more verification factors to gain access to a resource. These include:<\/p><ul><li>Something you know, like your password<\/li><li>Something you have, like your smartphone<\/li><li>Something you are, which incorporates fingerprints and voice recognition<\/li><\/ul><p>OTPs are the most common MFAs, but cybercriminals are bypassing them with increasing regularity.<\/p><p>Let\u2019s add more factors then?<\/p><p>Nope, it\u2019s not about how many factors you have &#8211; it\u2019s the inherent strength of each. Here is a diagram arranging MFAs from weakest to strongest:<\/p><p>For your organization, you would be better off looking towards the right end of the spectrum. Incorporate phishing-resistant MFAs involving physical passkeys or biometrics to ensure safe authentication for your employees.<\/p><p>This is obviously an investment, so the best way to roll it out in your organization is to start off with privileged accounts that contain your most sensitive data before moving onto the rest. Also, it is imperative to regularly review and update your policies to deal with evolving threats.<\/p><p>Great, so you\u2019ve done everything on your part to ensure a safe login experience for your employees. But that\u2019s half the job done.<\/p><p>\u00a0<\/p><h5><strong>Educate Employees on the Dangers of Phishing.<\/strong><\/h5><p>\u00a0<\/p><p>The phishing scene today isn\u2019t the same one from a decade ago &#8211; it\u2019s got infinitely more sophisticated. Today\u2019s phishers employ advanced social engineering techniques and impersonate trusted entities with consummate ease. And it\u2019s a bottomless pit once you\u2019re reeled in &#8211; phishing serves as a gateway for large-scale data breaches, ransomware attacks and financial fraud.<\/p><p>Since your employees are the targets for this, it is important for them to recognize and report these attempts immediately. Regular phishing awareness training helps with this, and from your end, you can deploy a variety of endpoint security solutions for detection &amp; prevention.<\/p><p>You\u2019ve covered your employees, but now, it\u2019s time to look inward. And the answer is really quite simple.<\/p><p>\u00a0<\/p><h5><strong>Update Your Software.<\/strong><\/h5><p>\u00a0<\/p><p>Software vendors often release patches to safeguard their offerings from recent vulnerabilities. But we\u2019re mentally conditioned to press the \u2018Update Later\u2019 button whenever a new patch comes about. This can be very dangerous &#8211; the duration it takes for you to update is the duration a cybercriminal has to find a way in. Remember, time is an attacker\u2019s friend, so don\u2019t give them any.<\/p><p>Have robust patch management policies that prioritize patches based on criticality, impact, and risk of exploitation. Furthermore, create intense urgency among your employees if there is an update on their systems, like a firewall or antivirus.\u00a0<\/p><p>These are essentially the 4 pegs of this Cybersecurity Awareness Month\u2019s theme to \u2018Secure Our World\u2019 &#8211; but there\u2019s a lot more you can do to stay ahead of the curve:<\/p><ul><li>Incorporate a <strong>least privilege access<\/strong> model, which limits user rights to the bare minimum necessary to complete job functions. This is increasingly important in an age of remote working and third-party supply chains.<\/li><li>Use VPNs for your browsing.<\/li><li>Adopt end-to-end encryption for your emails, a medium which often contains your most sensitive data.<\/li><li>Go with AI &amp; ML-enabled tools like DLP (data loss prevention) and EDR (endpoint detection &amp; response). The cybercriminals are starting to use malicious AI in their attempts, so it\u2019s only right to fight fire with fire.<\/li><\/ul><p>\u00a0<\/p><p><strong>We are in an era where data is the most prized asset of any organization. This Cybersecurity Awareness Month let\u2019s make a pledge to do everything in our power to protect it! Stay vigilant, stay safe.<\/strong><\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Most of us can agree that it was a much simpler time back in 2004. Yet, behind the scenes, the seeds were being planted for the increasingly connected world we live in today.\u00a0 In October 2004, there were about 812 million internet users, roughly 12.7% of the world population. That has exponentially risen to 5.54 &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-kh\/blogs\/tips-to-stay-cybersafe-this-cybersecurity-awareness-month\/\"> <span class=\"screen-reader-text\">Tips To Stay Cybersafe This Cybersecurity Awareness Month<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":19,"featured_media":15059,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[109],"tags":[],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/13565"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=13565"}],"version-history":[{"count":0,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/13565\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media\/15059"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=13565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=13565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=13565"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/whitepapers?post=13565"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/case_studies?post=13565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}