GoDubai
  
  
  
  
Citylife > Press Release
  Home Contact us Add to Favourites
Most Recent Postings
More Press Releses
Featured Sections

Event Finder
A daily roundup of exhibitions, promotions and other events in Dubai and the rest of the Emirates.
Submit an Event
Latest Dubai Press Releases >> Technology

 
  Share

By Alain Penel, Regional Vice President – Middle East, Fortinet.

While nearly 9 in 10 companies not only allow, but actually rely on their employees to access critical business apps using their personal devices, according to a recent Fortinet Threat Landscape Report, Android-based malware now represents 14% of all cyberthreats. And in addition to direct attacks, the number of compromised web sites, email phishing campaigns, and malicious access points continue to grow exponentially, infecting unsuspecting users – regardless of their devices –with spyware, malware, compromised applications, and even ransomware.

And whenever a personal device of any of your employees becomes compromised, they can represent an increased risk to your organization as well. In addition to deploying mobile device management software and security clients to your employees, it is critical that you establish a cybersecurity awareness program that provides critical insights into how they can avoid these risks.

Here are five critical elements that ought to be part of any cyber security awareness program.

1. Beware of Public Wi-Fi

While most public Wi-Fi access points are perfectly safe, that's not always true. Criminals will often broadcast their device as a public access point, especially in public locations like food courts or at large events. Then, when a user connects to the Internet through them, the criminal is able to intercept all the data moving between the victim and their online shopping site, bank, or wherever else they browse to.

Many smart devices will also automatically search for known connection points, like your home Wi-Fi. Newer attacks watch for this behavior and simply ask the device what SSID they are looking for. When the phone tells them it is looking for its ‘home' router, the attack replies with, “I'm your home router,” and the phone goes ahead and connects. Smart devices will do the same thing with Bluetooth connections, automatically connecting to available access points.

To combat this issues, it's a good practice for users to turn off Wi-Fi and Bluetooth until they are needed. In the case of wireless access, they should verify the SSID of a location, often by simply asking an establishment for the name of their Wi-Fi access point before connecting. Users should also consider installing VPN software so they can ensure they only make secure, encrypted connections to known services.

2. Use Better Passwords

Another mistake users make is using the exact same password for all their online accounts, usually because remembering a unique password for each site they have an account on may be impossible. But if a criminal manages to intercept that password, they now have access to all of the user's accounts, including banking and shopping sites.

The best option is to use a password vault that stores the username and password for each account, so all that needs to be remembered is the password for the vault. Of course, extra care must be taken to ensure that the vault password is especially strong and easily remembered. one trick for creating a strong passwords is to use the first letters of a sentence, song lyric, or phrase, insert capital letters, numbers, and special characters, and you've got a pretty secure password.

To be even more secure, consider adding two-factor authentication for any location where sensitive data is stored. It's an extra step in the login process, but will significantly increase the security of their account and data.

3. Recognize Phishing

You've probably repeated to your users to never click on links in advertisements sent to their email or posted on web sites unless they check them first. There are a lot of tells, such as poor writing or grammar, complex or misspelled URLs, and poor layout that can be a key giveaway that an email is malicious.

But it turns out that there will always be someone who can't resist opening an email, launching an attachment from someone they don't know, or clicking on a link on a website – especially when it includes an enticing subject line. Which is why any educational efforts need to be supplemented with effective Email Security Gateway and Web Application Firewall solutions that can detect spam and phishing, validate links, and run executable files in a sandbox – even for personal email – to ensure that malicious traps simply do not get through to an end user.

4. Update Devices and Use Security Software

Users should have a corporate-approved security agent or MDM solution installed on any device that has access to corporate resources. This software also needs to be kept updated, and device scans should be run regularly.

Similarly, endpoint devices need to be regularly updated and patched. Network Access Controls should be able to detect whether security and OS software is current, and if not, users should be either redirected to a remediation server to perform necessary updates or alerted as to the unsecure status of their device.

5. Monitor Social Media

Criminals will often personalize an attack to make it more likely that a victim will click on a link. And the most common place for them to get that personal information is from social media sites. The easiest way to prevent that is to simply set up strict privacy controls that only allow pre-selected people to see your page. Individuals wanting an open social media profile need to carefully select who they will friend. If you don't know someone, or if anything on their personal site seems odd, dismiss their request. And even if the person is someone you know, first check to see if he or she is already a friend. If so, there's a significant possibility that their account has been hijacked or duplicated.

Keep Training Messages Short, Clear, and Regular

It is essential that you develop a comprehensive and effective security strategy for your users who have personal endpoint devices connected to your network. But don't make the mistake of burying them in information. Break information down into easily digestible chunks. Provide a daily security tip. Post messages around the company, such as in the hallways or break room. Get the executive team to mention it in staff meetings. And provide checks, such as your own phishing emails, to help identify users that might need additional attention.



Posted by : GoDubai Editorial Team
Viewed 2166 times
Posted on : Thursday, October 31, 2019  
Replication or redistribution in whole or in part is expressly prohibited without the prior written consent of GoDubai.com.
Previous Story : du Women Council Awarded for Women Empowerment at the Prestigious RiiSE and Entrepreneur Middle East...
Next Story : Jurors revealed for 2020 Sony World Photography Awards
Email this article Print this article

Share this article with your friends and followers
NewsVine

Comments

Back to Top  
Most Viewed Press Release posted in the last 7 days
Get Festive Ready With Prestige Cosmetics Holiday Collection
Chlo's Iconic Carlina Sunglasses In a Precious New Interpretation
PACE to Space
Master Chronometer: Raising Standards
Holiday Hair-Styling Essentials from VIERRO
Luxe Beauty Gifts for your Loved Ones this Festive Season
Arabic version of Zoho Creator launched to help businesses create custom applications
Formula 1 meets Virgin Hyperloop One: California-based Developer to Showcase Pas...
Indulge in New flavours sprinkled With A Dash of Bollywood & Nostalgia at Hitchki
Life-changing Raffles Announced for 25th Edition of Dubai Shopping Festival
Union Coop Pays Tribute to the Martyrs on Commemoration Day'
'Tis the Season to Be Glamorous - Beauty Essentials from GlamBeaute.com!
Homegrown Jewellery Brand Sumaya Bakkar Collections Curated Festive Gift List
Cisco Advances Solutions to Simplify Cybersecurity Processes in Saudi Arabia
Berkan Steakhouse Launches in Dubai
Emirates Post issues commemorative stamps to celebrate the UAE 48th National Day
ENEC Releases 'Tasamoh' a Rehabilitated Green Turtle and organizes Beach Cleanu...
Robinsons celebrates UAE National Day with leading Emirati brands and a host of ...
Dunecrest American School Celebrates the UAE National Day
Your Holiday Gift Guide for Her
Zambian President affirms commitment to bolster UAE ties
China Homelife the Largest China Sourcing Platform Set to Showcase a Wide Variet...
Spice Up with Shades of Brown from 2XL Furniture & Home Dcor
Italy breaks ground for its Pavilion at Expo 2020 Dubai
LG Electronics Announces Leadership and Operational Changes Ahead of 2020
Dubai Cares' Volunteers bring hope to children in remote village in Senegal
Celebrate the 48th UAE National Day at Dalma Mall'
Pupils at Dubai Heights Academy mark 48th National Day with two days of traditio...
Arabian Automobiles INFINITI presents the apex in road safety with the QX50'
GROHE Goes ZERO Carbon-Neutral Production by 2020
du & National Archives offer nostalgic journey into UAE's past on 48th National Day
Dubai Festival City Mall Visitors In for A Jolly Festive Season Like No Other in...
Customs World inks MoU with Indonesia to roll out World Logistics Passport
Emotional and highly dynamic: the design of the MINI John Cooper Works GP.
The Middle East Organic Market's Premiere Business Event Opens In Dubai
New year, New You with Lunette
Cole Haan Makes Its Debut at Sole Dxb 2019 Showcasing Footwear Collaborations
Statement Cardigans
GROHE received the Red Dot: Brand of the Year
Uncovering the Beauty of Mechanics'
Sumo Sushi & Bento Celebrates UAE National Day With an Exclusive Bento Offer for...
Best Menswear Items
Ministry of Economy launches new development plan as part of the National Progra...
Annual DIAC Conference examines impact of UAE Arbitration Law
Set Up Stylish Outdoor Spaces with 2XL Furniture & Home Dcor
Free gold coins at Malabar Gold & Diamonds Festival.
Air Cargo Peak Season off to Slow Start, Annual Demand down 3.5% in October
Emiratis and expats set off to a two-week Camel Trek across the UAE desert
Lewis Hamilton Tops Off Sixth World Title With Victory at Formula 1 Etihad Airwa...