Satoshi Nakamoto Blog
Image default
- 2018 a access accounts activity Add Advanced all ALONE announced anti-virus Antivirus Applications AT Attack Attacks authentication awareness Back Backups Better Big brand breaches building bullet Business businesses Buzzwords Can Check Companies computers Corporate Cost Course Criminals Critical Crypto Cyber cyber risk cyber security cyber-attack Damage data Develop Discover Disruption Due eBay email engineering Enterprise Even Evolving Experience Facebook fast feature FEATURES files Firewall Firewalls fix Flood Forms GATE generation Guest Post Headlines help Host IE In Internet ireland IT JP Morgan JP Morgan Chase JUST Keeper Know knowledge latest Leaks Like Limited Machines Main major Malware Management manager Managers Managing May Monitoring network networks New NEWS Next Next Generation Novi now office Office 365 OFFSITE One operating owners Password passwords PATH phishing Post Problem protect Radio Ransomware Rise Risk running Safe Scams sector secure Securing Security Sell server Set Up Silver Small small businesses SME SMEs So Social social engineering software Solution Spam ssl Stats storage store stories Systems Take The thinking Threats Three Time TWO updates Upgrade US Users Verizon Virus viruses vulnerable WannaCry Water Web why world Yahoo Your

Why cyber security management is like an onion – Irish Tech News

Guest post from

Why is Cyber Security Management often compared to a common garden vegetable – the onion? Maybe because managing cyber risk can be a bitter experience and even make you cry? True perhaps, but the main thing that cyber security management and an onion have in common is LAYERS.

We’ve all heard the buzzwords these days around network security – ransomware, crypto viruses, spam, scams, phishing, social engineering. They are hard to miss – they are on the news, on the radio and in newspapers.

Stories of companies being hit by cyber-attacks can dominate the headlines. Usually it’s a big multinational, well-known brand; think Facebook, Yahoo, eBay, JP Morgan Chase. But the less well known, mid- and lower-tier companies are now more at risk than ever. Breaches at these companies just don’t sell as many newspapers so are less reported on.

If we look at the data, attacks on SMEs in particular are on the rise due to a lack of awareness around cyber security and limited budgets. According to Verizon Enterprise 2018 DBIR, 58% of malware attack victims are categorised as small businesses.

So if you are an IT manager or a business owner in the SME sector, what are you currently doing to help prevent a cyber-attack? Maybe you bought the latest antivirus software? Is that enough? Unfortunately not!
There is no one silver bullet solution. The key to safely securing your business from cyber-attacks is layering (thus the onion!). The more layers you have securing your network the better. Antivirus is just one such layer. Here are more we recommend:

Possibly the most important security layer on your network is a firewall, it serves as the gate keeper between your network and the big bad cyber world out there.

There are of course different types, which brings us back to the importance of layering.
A standard firewall is a bit like building a damn to protect your network. The damn might hold back the bulk of the water, but holes can develop and over time enough water leaks through to cause a flood that the damn can’t hold back.

Next Generation Firewalls
Thankfully firewalls have become more advanced than being just a blunt instrument. Next Generation Firewalls (NGF) include a host of features including built in anti-virus, web filtering, SSL inspection and more, putting many layers between your network and the internet. An NGF can help detect, analyse and reject threats intelligently before they even get to your network. But don’t be fooled to thinking an NGF alone solves the problem!

Patch Management
40% of users don’t upgrade software when prompted. 87% of corporate computers are missing critical updates. These are just some of the stats around the importance of regular and timely patching. Some of the major breaches in recent times, such as WannaCry, gained entry to networks through exploiting a weakness that wasn’t patched. As soon as a new patch is announced, the criminals move fast to exploit the weakness in the knowledge that users are slow to initiate patching. Timely and fast patch management is critical to being cyber secure.

Secure Offsite Repository

Most businesses know they need to back up their data and systems regularly. However they frequently use machines and systems onsite to store their backups. Nowadays, these machines are no longer entirely safe and secure, rendering the backups vulnerable. Offsite storage of files, data and also critical server operating systems, applications and configurations adds an additional layer of security and ensures a business can get back up and running after an attack safely and quickly.

Two Factor Authentication

2FA is a feature of Office 365 which many users don’t avail of. With 93% of malware delivered via email, 2FA is another critical component in securing accounts. Accounts that have been set up to use 2FA will require an extra check, so even if a criminal knows your password, they won’t be able to gain access. This is reassuring given many users don’t choose strong enough passwords and re-use the same password across accounts.

Monitoring Systems

The importance of ongoing monitoring of cyber activity in a business network cannot be over emphasised. Identifying threats before they do damage is as important as being able to fix the problem after and involves less cost and disruption. Some forms of malware can bypass firewalls or gain access via an unpatched vulnerability and then lie dormant in a network, evolving over time. Ongoing and continual monitoring identifies threats that could potentially activate at any time.

Nowadays, IT managers and business owners may realise the importance of Cyber Security, but not all are sure which path to take to secure their business. As discussed, there is no quick fix or one solution which fits all. Remember the onion – you need the layers to protect the core. One layer, or even two or three, can be penetrated as cyber criminals continually discover new ways to get in.

Source link

Related posts

UL’s Irish Composites Centre wins funding to tackle scourge of Plastic Waste – Irish Tech News


Microsoft backtracks on plans to scrap free software licenses for partners


Get Your Favourite Project Listed on a Fast Growing Crypto Exchange That Support Fiat – Bitzamp


Gatecoin Crypto Exchange to Shut Down on Court’s Orders


Nintendo Tries to Bluff Sony & Microsoft on Cloud Gaming


Crypto Town Hall Meetings Grow to 8 Indian Cities for More to Voice Regulatory Ideas