With an increasingly multi-year workforce and other technological experts who are accustomed to pervasive technology, user experience at the highest level becomes a linear concept.
It is claimed to have it on different devices, everywhere, using personal applications and devices at work, and vice versa. However, these employees often do not consider the risks that might arise from the introduction of new technologies into the business environment.
In addition to maintaining perimeter protection, threat intelligence monitoring, and other daily responsibilities to prevent cybercriminals from accessing the network through zero-day threats and vulnerabilities, corporate security managers now need to consider all ways in which cybercrime can be used to prevent cybercrime from
Internal threats have become one of the main concerns for security officers and security teams. These threats do not only relate to employees who intentionally attack their organisation. More often, these threats arise from employee negligence and the use of technologies without considering the best practices of cybersecurity.
As a result, today Antonio Madoglio, Director Systems Engineering of Fortinet, 51% of organizations are afraid of finding safety risks caused by human error. Unfortunately, internal threats will only grow as the “human” attack surface expands: six billion internet users are expected by 2022, as a result, some cybercriminals have started to focus on the exploitation of human access, rather
To minimise risks, security managers and security teams will need to be aware of the devices and tools used by employees and implement the controls necessary to protect them.
Madoglio points out five of the emerging technologies, trends, and the most common behaviours that security managers must pay particular attention to.
People usually have a number of accounts on different platforms and apps. Many use the same access credentials on all, regardless of whether it is personal or business accounts. This is a significant problem. Cyber criminals can use the completion of credentials to leverage a password and access other accounts. The problem is particularly aggravated by the use of the cloud • if the same password is used for all cloud accounts, in case of one violation, it is as if everyone was hit.
To combat these risks, security teams must promote the use of new and diversified passwords, especially for corporate accounts, and at the same time restrict employee access to certain authorised network areas only. This can be done with identity and access management solutions that require two-factor authentication, password management software so that users can implement a more sophisticated password management strategy without losing track of it, and
When employees use technology that is not approved by IT teams, they may incur data loss, vulnerability, and lack of compliance by circulating sensitive business information outside approved networks and programs. Security officers and security teams must be aware of which devices and applications are used within the network at all times. The use of endpoint protection and web application firewall allows security teams to minimize the risk posed by the internal system by detecting endopints and applications on the network and then identify and segment those at risk.
Remote work is becoming more and more widespread, with employees connecting online from home, from a bar, or on the go. If this can support productivity and efficiency, security officers must ensure that these devices connect to secure access points. When using the public WIFI, cybercriminals can intercept the data stream between the end user and the organization. Security managers can minimize these risks by encouraging VPN use and implementing wireless management solutions.
Email and phishing scams
Although it is not new, it is one of the most common attacks used by cybercriminals to hit people, as almost everyone regularly uses email. With phishing, users receive an email from an apparently reliable source, such as their bank, a colleague, etc.These emails usually ask the user to subscribe to their credentials or click on a link, which implies theft To minimize the opportunities for phishing attacks that compromise the network, security officers should implement security controls of email gateways.
Social accounts are a common way for cyber criminals to distribute malicious links, or to collect personal data that can be used to create even more targeted attacks. Security officers should implement a strict social media policy and discourage employees from accepting requests for friendship and messages from strangers, especially if they are invited to click on a link while they are on the corporate network. Security teams should make sure they have antimalware and firewall solutions available. They should also train employees to recognize social engineering models that try to subtract personal data to access corporate networks and accounts.
If security managers often already have many of the tools needed to minimise the risk of these trends, it is equally important that they use them in a unified way rather than by providing isolated and different solutions. Integration and automation between secure e-mail gateways, firewalls, endpoint protection, WAF, access management and more provide a holistic view of activities across the network, allowing security teams to quickly detect potentially dangerous actions or behaviours