Cybersecurity has become a top priority for all types of organizations today when it comes to keeping their information safe from theft, damage, and disruptions. In order to have the best cybersecurity, organizations must be up to date, using best practices and procedures to prevent hackers from succeeding.
Discover how the enemy works and how you can defend your organization with the following presentation, A Look Into Cyber Security:
Network security in cyberspace is never far from the headlines. When it does reach the headlines, it’s never good news. Here are just a few famous – or infamous – security breaches of the not-too-distant past, even though they might seem like ancient history by now: Target, Adobe, TJX, Home Depot, Sony Playstation, Heartland, Epsilon. Hackers and cyber-thieves are, unfortunately, good at what they do and getting more sophisticated all the time. They take advantage of gaps and weak spots in information technology systems. But those gaps and weak spots are there, almost exclusively, because some human being wasn’t doing his or her job properly. We can always improve our hardware and software, and we’ll discuss a few ways we’re doing that. But it doesn’t matter how powerful or expensive your system is if you don’t know how to use it.
HOW THE ENEMY WORKS
Spam. Spear phishing. Social engineering. Confederates inside the target institutions. Black-hat tool kits that are more advanced than the tools that developers work with when building applications. They’re all part of the arsenal that hackers use. Nowadays we don’t hear much from the deposed African prince who wants to split a hundred million bucks with us. Cyber crime has gone way beyond such stickups of unwary individuals. The cyber criminals are working full time and studying your business. They scan for the open port, look for SSL vulnerabilities, do automated testing. They seek out the one vulnerable machine on the network or the one gullible or inattentive person who clicks on a link and lets malware in. They also learn who does your payroll, whether you use FedEx, who’s your ISP. They’ll send you an invoice that says your account is overdue and you’ll be terminated if you don’t reply. People click on the invoice link, which can look like a pdf file but which masks an executable one, without thinking. Even high-credentialed employees like executives, CFOs, and treasurers get duped. They’re in a hurry, and they click on links without thinking.