You are on page 1of 23

Security Threats stealing trade secrets, or gaining access and

blackmail material.
A cyber or cybersecurity threat is a malicious act
that seeks to damage data, steal data, or disrupt Hacktivists: Hacktivists activities range across
digital life in general. Cyber threats include political ideals and issues. Most hacktivist groups
computer viruses, data breaches, Denial of Service are concerned with spreading propaganda rather
(DoS) attacks and other attack vectors. than damaging infrastructure or disrupting services.
Their goal is to support their political agenda rather
Cyber threats also refer to the possibility of a
than cause maximum damage to an organization.
successful cyber-attack that aims to gain
unauthorized access, damage, disrupt, or steal an Disgruntled insiders: Disgruntled insiders are a
information technology asset, computer network, common source of cybercrime. Insiders often don't
intellectual property or any other form of sensitive need a high degree of computer knowledge to
data. Cyber threats can come from within an expose sensitive data because they may be
organization by trusted users or from remote authorized to access the data. Insider threats also
locations by unknown parties.  include third-party vendors and employees who
may accidentally introduce malware into systems or
Where do cyber threats come from?
may log into a secure S3 bucket, download its
Cyber threats come from numerous threat actors contents and share it online resulting in a data
including: breach. Check your S3 permissions or someone
else will.
Hostile nation-states: National cyber warfare
programs provide emerging cyber threats ranging Hackers: Malicious intruders could take advantage
from propaganda, website defacement, espionage, of a zero-day exploit to gain unauthorized access to
disruption of key infrastructure to loss of life. data. Hackers may break into information systems
Government-sponsored programs are increasingly for a challenge or bragging rights. In the past, this
sophisticated and pose advanced threats when required a high level of skill. Today, automated
compared to other threat actors. Their developing attack scripts and protocols can be downloaded
capabilities could cause widespread, long-term from the Internet, making sophisticated attacks
damages to the national security of many countries simple.
including the United States. Hostile nation-states
Natural disasters: Natural disasters represent a
pose the highest risk due to their ability to
cyber threat because they can disrupt your key
effectively employ technology and tools against the
infrastructure just like a cyber attack could.
most difficult targets like classified networks and
critical infrastructure like electricity grids and gas Accidental actions of authorized users: An
control valves. authorized user may forget to correctly
configure S3 security, causing a potential data leak.
Terrorist groups: Terrorist groups are increasingly
Some of the biggest data breaches have been
using cyber-attacks to damage national interests.
caused by poor configuration rather than hackers or
They are less developed in cyber-attacks and have
disgruntled insiders.
a lower propensity to pursue cyber means than
nation-states. It is likely that terrorist groups will What are examples of cyber threats?
present substantial cyber threats as more
Common cyber threats include:
technically competent generations join their ranks. 
Malware: Malware is software that does malicious
Corporate spies and organized crime
tasks on a device or network such as corrupting
organizations: Corporate spies and organized
data or taking control of a system.
crime organizations pose a risk due to their ability
to conduct industrial espionage (Links to an Spyware: Spyware is a form of malware that hides
external site.) to steal trade secrets or large-scale on a device providing real-time information sharing
monetary theft. Generally, these parties are to its host, enabling them to steal data like bank
interested in profit based activities, either making a details and passwords.
profit or disrupting a business's ability to make a
profit by attacking key infrastructure of competitors,
Phishing attacks: Phishing is when a Drive-by downloads: A drive-by download attack
cybercriminal attempts to lure individuals into is a download that happens without a person's
providing sensitive data such as personally knowledge often installing a computer virus,
identifiable information (PII), banking and credit spyware or malware.
card details and passwords.
Malvertising: Malvertising is the use of online
Distributed denial of service (DDoS) advertising to spread malware.
attacks: Distributed denial of service attacks aim to
Rogue software: Rogue software is malware that
disrupt a computer network by flooding the network
is disguised as real software.
with superfluous requests to overload the system
and prevent legitimate requests being fulfilled. Unpatched software: Unpatched software is
software that has a known security weakness that
Ransomware: Ransomware is a type of malware
has been fixed in a later release but not yet
that denies access to a computer system or data
updated.
until a ransom is paid.
Data centre disrupted by natural disaster: The
Zero-day exploits: A zero-day exploit is a flaw in
data centre your software is housed on could be
software, hardware or firmware that is unknown to
disrupted by a natural disaster like flooding.
the party or parties responsible for patching the
flaw.   
Advanced persistent threats: An advanced Why is it necessary to protect against cyber
persistent threat is when an unauthorized user threats?
gains access to a system or network and remains
there without being detected for an extended period Cybersecurity risks pervade every organization and
of time. aren't always under direct control of your IT security
team. Increasing global connectivity, usage of cloud
Trojans: A trojan creates a backdoor in your services, and outsourcing means a much larger
system, allowing the attacker to gain control of your attack vector than in the past. Third-party
computer or access confidential information. risk and fourth-party risk is on the rise,
making third-party risk management, vendor risk
Wiper attacks: A wiper attack creates a backdoor
management and cyber security risk
in your system, allowing the attacker to gain control
management all the more important for reducing
of your computer or access confidential information.
the risk of third-party data breaches.
Intellectual property theft: Intellectual property
Pair this with business leaders making technology-
theft is stealing or using someone else's intellectual
related risk decisions every day, in every
property without permission.
department, without even knowing it. Imagine your
Theft of money: Cyber-attacks may gain access to CMO trials a new email marketing tool that has
credit card numbers or bank accounts to steal poor security practices, this could be a huge
money. security risk that could expose your
customers' personally identifiable information
Data manipulation: Data manipulation is a form of
(PII) causing identity theft. Whether you work in the
cyber-attack that doesn't steal data but aims to
public or private sector, information security cannot
change the data to make it harder for an
be left to your Chief Information Security Officer
organization to operate.
(CISO), it must be an organizational wide initiative.
Data destruction: Data destruction is when a
cyber attacker attempts to delete data.
Importance of Security Planning
Man-in-the-middle attack (MITM attack): A MITM
attack is when an attack relays and possibly alters What is an Information Security Plan?
the communication between two parties who
believe they are communicating with each other. An information security plan is documentation of a
firm's plan and systems put in place to protect
personal information and sensitive company data.
This plan can mitigate threats against your become a top priority for businesses around the
organization, as well as help your firm protect the world.
integrity, confidentiality, and availability of your
data. While there’s no surefire way to prevent a
cybersecurity attack, there are a variety of methods
Why Do Firms Need an Information Security Plan? and software tools that can be implemented to
improve security and lessen the chances of being
In today's changing regulatory and investor targeted. This lecture will cover nine security tools
landscape, information security plans are critical for every security analyst and professional should
firms to comply with SEC regulations, due diligence know about.
requests from investors and state
laws. Additionally, cybersecurity threats are Security Planning Tools
increasingly becoming more common and more
sophisticated. Aside from protecting the integrity of 1. Vulnerability Management Software
your data and keeping it confidential, there are These software tools allow you to identify network
other legal requirements: any firm registered with threats such as hackers, viruses, or malware, so
the SEC must have a plan in place, and there may you can immediately begin work to prevent or
be other state or industry specific regulations that combat them. Vulnerability management tools
require your firm to have a formal plan. enable you to constantly test your network’s
Steps to Create an Information Security Plan: security. Since vulnerability management tools are
primarily focused on the identification and
Step 1: Perform a Regulatory Review and management of threats, they can take a few
Landscape different paths if one is detected. Upon recognizing
a vulnerability, the software can either alert
Your firm must first perform a regulatory review, as administrators, remedy the issue itself, or install a
all businesses have requirement coming from patch to alter security policies.
oversight bodies. There are also self-imposed
industry standards and expectations that come Example:
from external stakeholders.
SpyBot
Step 2: Specify Governance, Oversight &
Responsibility SpyBot is a vulnerability management software tool
by Safer-Networking Ltd. It combines antivirus and
Create a CIRT (Computer Information Response its unique technique to protect your organization
Team) or CISRT (Computer Information Security from spyware, keyloggers, trojans, adware, and
Response Team). This group will be responsible for more. Since finding a solution to fit your company’s
ensuring the firm follows the policy and procedures unique needs is a must, it’s important to find tools
around the information security plan. Though these with flexible plans. SpyBot makes this easy, with
specialized teams have responsibility to oversee multiple plans for both private users and business
policy, all members of the firm have a role in users, all coming with various features and costs.
information security.
Qualys
Step 3: Take Inventory of Assets
Qualys was awarded the 2017 Global Vulnerability
In simplest of terms: know what you have. Create Management Market Leadership Award by Frost &
an inventory of both hardware and software and Sullivan. It offers a variety of tools in various
identify existing safeguards and controls you have categories, including asset management, IT
in place. This step is crucial, as you can't properly security, cloud security, compliance, and more.
assess your firm's level of risk or adequately protect Qualys VM (the company’s vulnerability
data and information unless you understand what management tool) scans and identifies
systems you have and what data they hold. vulnerabilities with 99.9 percent accuracy,
according to its website.
Atera
Security Planning Tools
Atera is a vulnerability management software tool
As security breaches continue to affect companies that provides real-time status updates on system
big and small, taking preventative measures has resources, logged-in users, network and IP
monitoring, SNMP monitoring, Windows updates, 4. Antivirus Software
and more. The tool’s customizable options let users
decide which alerts they receive via email Antivirus software helps businesses prevent or
notification. It also includes IT automation, patch detect malicious software within an endpoint
management, asset and inventory tracking, device. These tools host a variety of detection
reporting and analytics, and more. features that enable security teams to identify
potential malware and viruses that may attempt to
breach your devices.
2. Password Managers
These software tools generate, retrieve, and Signature-based antivirus software scans files
manage entirely random passwords for all of your (from any source) to make sure that there aren’t
accounts, plus keep track of other critical any hidden threats. And if it finds something shady
information, like bank account numbers, PIN codes, or scary, it can often remove or quarantine the
answers to security questions, and more. You just affected file. While antivirus software certainly isn’t
need to remember one password–the one that gets bulletproof — especially when it comes to zero-day
you into this lockbox of secure information. threats (i.e. vulnerabilities that hackers have found
before software vendors have a chance to patch
Example: them and/or users have a chance to install
1Password updates) — it’s still a critical piece of the cyber
security puzzle. There are many options to choose
1Password’s name is certainly fitting. With this from that range in price from free to hundreds of
password manager, you only need to remember– dollars a year.
you guessed it–one password. The software tool
Example:
offers two plans (a pro plan and a standard plan)
that enable businesses to securely share Malwarebytes
passwords and other important items. It offers
features like zero knowledge, meaning information Malwarebytes is an endpoint protection software
is fully encrypted before it’s sent to 1Password, and tool that helps your team actively protect against all
a secret key, an effort that combines a randomly forms of malware. Malwarebytes offers a variety of
generated key with the master password to ensure different security solutions, but this particular tool
each user has an unbreakable master password. brings all of their technologies together into one
multi-layer defense solution. Malwarebytes can
Keeper scan for and remediate malware, which reduces
dwell time and the need for endpoint re-imaging.  
Keeper is a password manager that auto-generates
strong and secure passwords, protects sensitive Webroot Endpoint Protection
files, and enables you to securely share records
and critical information with team members. This Webroot Endpoint Protection is an endpoint
tool can be great for businesses, as managers are protection and antivirus software that helps to
able to enforce password policies and monitor protect against sophisticated online
password compliance. Keeper also offers the ability threats without sacrificing your system
to quickly and securely autofill login credentials to performance. The tool offers a multi-layered
save time. protection that helps to prevent threats across a
variety of mediums, including email, web browsing,
LastPass files, URLs, ads, apps, and more.
LastPass aims to help businesses save time,
achieve stronger security, and uncover process
efficiencies. It’s a brand of LogMeIn and helps
companies enforce a meaningful password policy
with an enterprise-ready solution, although it’s
suitable for businesses of all sizes. The enterprise
version offers advanced security features,
automated provisioning options, and additional
integrations so that customers can personalize their
experience.
ESET Endpoint Security It is guaranteed under the constitution in many
developed countries, which makes it
ESET Endpoint Security is an antivirus software a fundamental human right and one of the core
tool that leverages a multilayered approach to principles of human dignity, the idea most people
constantly balance performance, detection, and will agree about.
false positives. It’s supported on multiple operating
systems, including Windows, MacOS, Linux, and Any risk assessment conducted for the purpose of
Android. Based on G2 Crowd reviews, the tool enhancing the privacy of individuals’ personal data
hosts feature like asset management, device is performed from the perspective of protecting
control, application control, and more. the rights and freedoms of those individuals.
What is Data Security

Data security is focused on protecting personal


data from any unauthorized third-party access or
malicious attacks and exploitation of data. It is set
up to protect personal data using different
methods and techniques to ensure data privacy.
Data security ensures the integrity of the data,
meaning data is accurate, reliable and available
to authorized parties.
Data Security methods practices and
 What is Data Privacy processes can include:
There are various privacy definitions online. Data  - activity monitoring
privacy or Information privacy is concerned
with proper handling, processing, storage and  - network security
usage of personal information. It is all about the
rights of individuals with respect to their personal  - access control
information.  - breach response
The most common concerns regarding data  - encryption
privacy are: managing contracts or policies,
applying governing regulation or law (like General  - multi-factor authentication
Data Protection Regulation or 
Similarities and differences between Data security
What is GDPR? and Data privacy

The GDPR or General Data Protection In short, data privacy and data security are, by no


Regulation is an EU regulation on data protection means, the same terms. Data privacy is about
and data privacy that applies to all data processing proper usage, collection, retention, deletion, and
done by organizations and institutions operating in storage of data. Data security is policies, methods,
and means to secure personal data.
the EU, and outside of the EU if they are
processing personal information of the citizens or Think for example of a window on a building;
residents of the European Union or European without it being in place an intruder can sneak in
Economic Area (EEA). and violate both the privacy and security of the
occupants.
https://dataprivacymanager.net/glossary/gdpr-fines/
Once the window is mounted it will perform a pretty
https://dataprivacymanager.net/solutions/third- decent job in keeping unwanted parties from
party-management/ getting into the building. It will, however, not
prevent them from peeking in, interfering thus
with the occupants’ privacy. At least not without a
Privacy, in general, is an individual’s right to curtain.
freedom from intrusion and prying eyes or the right
of the person to be left alone.
In this (oversimplified) example the window is a In a complex environment where so much depends
security control, while the curtain is privacy on the data that businesses collect and process,
control. protecting that information becomes increasingly
important. Among the steps business owners take
The former can exist without the latter, but not vice to protect the data of their users, drafting a clear
versa. Data security is a prerequisite to data and concise Privacy Policy agreement holds
privacy. And information security is the main central importance.
prerequisite to data privacy.
What is a Privacy Policy?
Cybersecurity
A Privacy Policy is a statement or a legal document
When it comes to cybersecurity (i.e. computer, that states how a company or
digital), we can agree that it refers to protective website collects, handles and processes data of
measures that we put in place to protect our its customers and visitors. It explicitly describes
digital assets from harmful events such as human whether that information is kept confidential, or is
and technical errors, malicious individuals and shared with or sold to third parties.
unauthorized users.
Personal information about an individual may
However, for the sake of completeness, we have include the following:
to admit that even in this day and age not all
information is digital.  Name
We still deal with numerous paper documents,  Address
which in turn hold very valuable information worth  Email
protecting.  Phone number
 Age
This is exactly where the term information  Sex
security comes in handy, denoting the practice of  Marital status
preventing unauthorized access, use, disclosure,  Race
modification or destruction of information in  Nationality
whatever form.  Religious beliefs

The three pillars of information security: For example, an excerpt from Pinterest's (Links to


Confidentiality – prevents sensitive information an external site.) Privacy Policy agreement clearly
from reaching wrong people, while making sure that describes the information Pinterest collects from its
the right people can use it; users as well as from any other source that users
enable Pinterest to gather information from. The
Integrity – maintains the consistency, accuracy, information that the user voluntarily gives includes
and trustworthiness of information over its lifecycle; names, photos, pins, likes, email address, and/or
and phone number etc., all of which is regarded as

Availability – ensures that the information is information.


available when it is needed.

Privacy Policy Development


Today's business world is largely dependent on
data and the information that is derived from that
data.
Data is critical for businesses that process that
information to provide services and products to
their customers. From a corporate context, in a
company - from the top executive level right down
to the operational level - just about everyone relies
heavily on information.
our society. From credit card numbers and social
security numbers to email addresses and phone
numbers, our sensitive, personally identifiable
information is important. This sort of information in
unreliable hands can potentially have far-reaching
consequences.
Companies or websites that handle customer
information are required to publish their Privacy
Policies on their business websites. If you own a
website, web app, mobile app or desktop app that
collects or processes user data, you most certainly
will have to post a Privacy Policy on your website
(or give in-app access to the full Privacy Policy
agreement).
There are several reasons for a website to post its
Privacy Policy agreement on its website.
Here are some of the main reasons:

 Required by the law


 Required by third party services
Additionally, Pinterest also states that it collects
 Increases Transparency
user location data from mobile devices, and if
someone makes a purchase on Pinterest, payment
and contact information - including an address and A Privacy Policy is Required by the Law
phone number - will be collected. If users buy For individuals to feel comfortable sharing their
products or services for others, Pinterest gathers personal information on the internet, there should
their contact information and shipping details, too. be some sort of legal responsibility
Users may also give Pinterest permission to access Countries around the world have realized the need
information that is shared with other websites like to protect their citizens' data and privacy.
Facebook and Twitter by linking their Pinterest Businesses and websites that collect and/or
account with them. This information would also process customer information are required to
include information about their friends and publish and abide by a Privacy Policy agreement.
followers. The account settings have information
about how much access Pinterest has to their A majority of countries have already enacted laws
users' data. to protect their users' data security and privacy.
These laws require businesses to obtain explicit
In sum, a Privacy Policy is where you let your users consent from users whose data they will store or
know all about how you make sure their privacy is process.
respected by your business practices.
A few of these laws include the following:
Why you Need a Privacy Policy

Privacy is not a new concept. Humans have always  CalOPPA (Links to an external


desired privacy in their social as well as private site.) in the USA
lives. But the idea of privacy as a human right is a  GDPR (Links to an external site.) in
relatively modern phenomenon. the EU
Around the world, laws and regulations have been  PIPEDA (Links to an external site.) in
developed for the protection of data related to Canada
government, education, health, children,
consumers, financial institutions, etc. For a business or a website that collects and
processes user information in a certain region or
This data is critical to the person it belongs to. Data country, it is very important to have complete
privacy and security binds individuals and knowledge of the data and privacy protection laws
industries together and runs complex systems in enforced in that region and the region your
customers and end users are in. Non-compliance A Privacy Policy is Required by Third Party
with these laws can result in hefty fines or even Services
prosecution against the violator.
Apart from governing laws, some websites like
In some cases, businesses have to follow laws Apple, Amazon, and Google require website and
specific to states or regulations specific to app owners to post a Privacy Policy agreement if
industries. they use any of their services.
For example, here's how General Motors (Links to Many websites and apps use in-page/in-app
an external site.) complies with CalOPPA in the US advertising by third parties to generate revenue. As
by including a California-specific section in its these ads also collect user data, third parties
Privacy Policy: require the websites or apps to ask their users'
permission for sharing their personal data.
For example, if you're using Google
Analytics (Links to an external site.) on your
website, the Google Analytics Terms of Service
requires that you post a Privacy Policy agreement.
In addition to this, you must also disclose that
you're using Google Analytics and some
information about how it collects and processes
data:

General Motors informs its California users of their


rights through its Privacy Policy as required by
CalOPPA.
If your website/app reaches users around the
world, regardless of where you're located or If you are a Google app developer, the Privacy
headquartered, you'll need to make sure you Policy Guidance requires that you inform your
follow privacy laws in all applicable countries users (Links to an external site.) about what data
you reach.
you collect, why you collect it, and what you do with
While data protection and privacy laws differ from it.
region to region, a Privacy Policy must
comprehensively inform its users about how their
data will be used.
For example, the GDPR is currently the most
robust privacy legislation in the world and one of its
main requirements for any business that falls under
its jurisdiction is to have a GDPR-compliant Privacy
Policy (Links to an external site.) that contains
some very specific information and is written in an
easy-to-understand way.
Whether your website is a self-help blog or a game
hosted at Google Play, it is your responsibility to
give your end users complete information about Some of the most popular third party services
how any associated third-parties will collect and require website and app owners to post Privacy
process their data and (if possible) to what Policy agreements on their websites. Some of
purpose. these services include:

 Amazon Affiliates
 ClickBank
 Google Play Store
 Google Analytics
 Google AdSense information, as well as how long their data will be
 Google AdWords stored on your servers.
 Facebook Apps
 Twitter Lead Generation Even if you don't collect personal information,
 Apple's App Store you should disclose this fact in a Privacy Policy.
It helps with transparency because users expect
Third party vendors like Google, Facebook, and to see a Privacy Policy. If you don't have one at
Amazon require their users (website and app all, users may assume you're collecting a lot of
owners) to explicitly inform their users if they're personal information and not disclosing it rather
using advertising features, cookies, or tracking than not collecting any.
services on their websites/apps in order to deliver The DuckDuckGo (Links to an external site.) search
better user experiences based on prior browsing engine does not track user searches or store online
behavior. browsing history in any way. Its Privacy Policy
Here's how Ookla (Links to an external site.) - a agreement states that it does not collect or share
fixed broadband and mobile network testing any user information.
company - informs its users in its Privacy Policy
agreement that it uses cookies, log files, flash
cookies, local storage, etc., in its website-based
and mobile applications in order to (1) improve
performance, (2) to better understand how Ookla's
software functions, and (3) to give the user a
personalized experience.
To make your Privacy Policy transparent and
accurate, conduct a privacy law self-audit (Links to
an external site.). This will allow you to find out
what your business' privacy practices are and what
information you need to disclose to your users in a
Privacy Policy.
Example of a Website Privacy Policy

To be transparent with your users about what


personal information you collect and what you do
with it, you are required to publish a Privacy Policy
agreement on your website or give in-app access to
it.
Websites usually post a link to the complete
Privacy Policy agreement from the footer of the
A Privacy Policy For Increased Transparency website, whereas apps generally add the Privacy
Policy to an "About" or "Legal" menu.
Companies whose business models revolve around
handling sensitive customer information find it Another popular location for ecommerce store apps
incredibly important to establish trust with their and websites is the checkout page, or account
users. A clear and comprehensive Privacy registration page if you don't have an ecommerce
Policy agreement that tells users exactly what component but allow users to create accounts.
information the company collects and what it
does with that information inspires confidence Medium (Links to an external site.) links its Privacy
in a business. It gives users a sense of security Policy agreement to its website footer:
knowing how much control they have over their
personal data under the conditions they sign up for.
Your Privacy Policy agreement should inform your Protection of Data from the Internet
users about how your website or app handles their
personal information. Your users must be also be The Internet has blurred the lines between real
informed about the reason for the collection of world and the virtual one. Technology is barreling
into our hands through smartphones at an
unbelievable pace. This is good for productivity and 6. Be careful what you do with your phone, and use
progress, but it makes it easy for thieves to do their a password. Entering a password every time you
job. want to use your phone may be tedious, but it’s
also the first line of defense if your phone gets lost
The anonymity and location independence that or stolen. Additionally, when you consider the vast
comes with the Internet muddles the moral amount of malware (Links to an external site.),
character of even the most ethical person. There’s Trojans and worms finding sneaky ways to get into
no assuming your phone and the information it your device, it is better to stay protected with a
stores is safe from the malicious intentions of the security system that does the work for you. App
human mind. Advisor is a special feature provided by Norton
Remember, the first line of defense in protecting Mobile Security. It prompts privacy risks, intrusive
your data is you. Learn about new threats, stay behavior of apps, excessive battery drainage and
current and take the necessary precautions to keep data plan usage.
your data safe.
7. Watch out for Bluetooth vulnerabilities. Bluetooth
These 10 tips to protect data from the Internet. technology offers incredible convenience. It also
opens doors for security weaknesses. Make sure
1. Create strong passwords and change them you turn off your Bluetooth when you are not using
often. Never save passwords on your device. Yes, it. While there are options to place your Bluetooth
it’s convenient. Yes, it saves time. If you need to activity in an invisible or undetectable mode, there
safely store passwords, look into a secure are some malicious apps that can change that
password manager. Criminals are getting smarter mode and expose your device to threats. That’s
and need just one chink in the armor to get into the one more reason to have a security system in
system to rob you blind. place.
2. Be conscious of privacy settings. Most apps offer
8. Keep your operating system up to date. “A
privacy settings for users. This gives you the
hindrance” is what many people call operating
freedom to know how much and what kind of
system updates. They are annoying and sometimes
information is shared. Always choose the least
time-consuming but are very important. Besides
amount of data sharing.
improving the functionality of the device, updates
3. Obtain reliable security for your phone. Phones and patches contain critical security updates. Make
need as much protection as any other device, if not it a point to update as soon as possible.
more. There are many security providers that offer
free services. These can be risky as they mine data 9. Beware of public Wi-Fi. Most home Wi-Fi
from your phone. Always go for a well-known connections are encrypted. Some public Wi-Fi
service provider. Norton Mobile Security has a connections are not. This means you’re at risk of
gamut of features that can protect your phone from people monitoring your online activity. Sometimes,
most threats. malware from someone else’s device can infect
your device. Ensure you’ve turned on your firewall,
4. Back up your data via reliable hardware and have up-to-date malware protection, or you
or software. Backing up data is often overlooked, could run into problems. Delete data that you no
but remains a very important aspect of data longer use.
protection. Ransomware is a type of attack where
hackers hold your data hostage for a ransom. 10. Close down any online service that you no
There are cloud-based services that offer backup, longer use. There are many social networks that
or you can opt for Norton Security Premium, which come and go. If you have signed up for any of
includes backup capabilities. these, they may have a wealth of your personal
information that you willingly gave. But eventually
5. Anti-theft your device. If your gadget is lost or when these services disappear, they take with them
stolen, tracking apps will help you find it. But how your information that can be sold as an asset.
do you protect your confidential data before it gets
into the wrong hands? Norton Mobile Security No protection method is 100% foolproof, but there’s
allows you to perform a “factory reset” to clearly plenty you can do to keep your information
completely erase your lost/stolen Android device. safe. Educate yourself on the latest security tactics
This includes your confidential contact lists, text and tricks, use good ‘ol common sense, and use
messages, call history, browser history, bookmarks Norton’s advanced protection products to protect
and any other personal data. what’s yours.
Security Layers implement Multi-Factor Authentication.
We also support the least privilege
In Computer Security, layers is a well-known model, so only the people who should
practice which was taken from military techniques. have access to your sensitive data do.
The aim of this is to exhaust the attacker when he 6. Protect and Backup Data
succeeds to penetrate the first layer of security by An important key to keeping your data
finding a hole, then he has to find a hole in the safe is to encrypt it where it's stored and
second layer and so on, until he arrives at the when it's transported. Using Continuous
destination if he succeeds. Data Protection, we'll make sure your
servers back up data as it changes. We
That's why there are 7 layers of Security. They'll can also replicate your critical data to a
show you how to protect your system and your secure, off-site location.
data-and why you need to take action now to make 7. Monitor and Test Your Systems
sure your information is there when you need it. Repeat after us: Always be vigilant.
EGiS is here to test your internal and
1. Information Security Policies external systems for risks, review your
These policies are the foundation of the policies with you, and continually
security and well-being of our resources. monitor, log, report and alert you to
They can help you increase the potential problems.
awareness of information security within
your organization. And they'll Data Loss and Theft Planning
demonstrate to your clients that you're
serious about protecting their Data Loss
information.
2. Physical Security In order to understand shortcuts to losing your data,
We secure our valuables under lock and the first thing we need to do is understand the most
key and we monitor our homes with common reasons that data is lost.
security cameras. It shouldn't be any
different for our servers and offices. The primary causes of data loss are:
We'll provide ways to keep your system
safe, with solutions that include  Human failure
everything from lockable racks to  Human error
password-enabled screen savers.  Software corruption
3. Secure Networks and Systems  Theft
EGiS builds networks and systems with  Computer viruses
your company's security in mind. Our  Hardware destruction
mission: to manage, monitor and protect
the perimeter of your network-that The results of the two best studies regarding data
crucial intersection where your private loss in the real world are depicted as follows:
network connects to the public Internet.
We'll make sure your DNS and domain Root Cause: Incident %
name is safe, provide e-mail filtering, Hardware failure: 40%
firewall and Internet content security and
more. Human error: 29%
4. Vulnerability Programs
Every system has inherent Software corruption: 13%
vulnerabilities. But by maintaining anti-
Theft: 9%
virus, anti-spyware, anti-spam and
Windows® and firewall updates-as well Computer viruses: 6%
as updates to your industry programs,
we can help you mitigate these risks. Hardware destruction: 3%
5. Strong Access Control Measures
We safeguard against unauthorized Source: David M. Smith, Ph.D., Pepperdine
access to your system by limiting and University
controlling access. We recommend  
using complex passwords that change
often. And, when possible, we
Root Cause: There should always be an off-site backup in the
Customer Perception: Actual Incident % event that there is damage to your physical office.

Hardware or system problem: 78%: 56% 3. Encrypt sensitive data

Human error: 11%: 26% Data is not always encrypted even when it’s on a
backup tape. Invest in a backup system or service
Software corruption: 7%: 9% that automatically encrypts all backups to ensure
Computer viruses: 2%: 4% that no matter who gets their hands on your data,
they cannot access
Natural disasters: 1%: 2%
4. Address data security
Source: Kroll OnTrack Data Recovery Services
Mobile devices are powerful business tools but they
What is Data Loss Prevention (DLP)? can leave your data vulnerable. Ensure your
devices can be wiped if they are lost with a remote
Data loss prevention (DLP) is a set of tools and device management system and use hardwares or
processes used to ensure that sensitive data is not mobile device systems that encrypt data.
lost, misused, or accessed by unauthorized users.
DLP software classifies regulated, confidential and 5. Use anti-virus and email security
business critical data and identifies violations of
policies defined by organizations or within a Email threats such as hacking, phishing or
predefined policy pack, typically driven by ransomeware can be some of the biggest threats to
regulatory compliance such as HIPAA, PCI-DSS, or data. Use a thorough anti-virus and security system
GDPR. Once those violations are identified, DLP to prevent malicious emails from getting through to
enforces remediation with alerts, encryption, and your company. Also be certain to offer continuing
other protective actions to prevent end users from education to your team about the importance of
accidentally or maliciously sharing data that could email security.
put the organization at risk. Data loss prevention 6. Trust the professionals
software and tools monitor and control endpoint
activities, filter data streams on corporate networks, Data is too valuable to be left alone. If you do lose
and monitor data in the cloud to protect data at rest, it, do not try to recover it by using any type of
in motion, and in use. DLP also provides reporting diagnostic tools. You don’t want to cause further
to meet compliance and auditing requirements and damage by trying to fix the situation on your own.
identify areas of weakness and anomalies for Instead, work with a trusted backup and data
forensics and incident response. recovery expert to ensure your data is safe.
Ways to Prevent Data Loss  
1.  Always back up your data Data Theft
Prevention is the best protection. Create a Data theft is the act of stealing information stored
structured backup strategy and consistently back on computers, servers, or other devices from an
up your files. Your backup plan should include the unknowing victim with the intent to compromise
different levels of data you maintain in your privacy or obtain confidential information. Data theft
company and the schedule for their back ups. is a growing problem for individual computer users
Some data is so critical that it may require you back as well as large corporations and organizations.
it up every week.  Also, be sure you periodically Data theft occurs both outside and inside
test your backups to make sure that your data is companies, and reducing the risk of insider data
being backed up properly. theft at the corporate level is anything but easy.
2. Diversify your backups This is especially true because system
administrators and employees have access to
You always want more than one backup system. technology such as database servers, desktop
The general rule is 3-2-1. You should have 3 computers, and external devices including USBs,
backups of anything that’s very important. They smart phones, and other removable and mobile
should be backed up in at least two different devices.
formats, such as in the cloud and on a hard drive.
Ways to Prevent Data Theft
1. Get rid of paper. strong passwords and by enabling remote wipe on
all devices.
If you have to keep paper files, shred them as soon
as they are no longer needed. According to John 6. Install or enable a firewall.
Rowan of Advantage Business Equipment, there
are nine things businesses should shred: Even small companies with few employees have
valuable data that needs to be protected. Ensure
you have a firewall in place to keep outsiders from
 Any mail with a name and address
accessing your company network.
 Luggage tags
 Trip itineraries 7. Secure your wireless network.
 Extra boarding passes
 Credit offers Use a strong password and use encryption and
 Price lists security to hide your wireless network from
 Vendor payment stubs and paid invoices. outsiders. Don’t let neighbors or passers-by hop
 Cancelled checks onto your network, or even see that it exists. You’re
just inviting trouble.
 Receipts
8. Use encryption to prevent data theft.
2. Assess which data you need to protect most.
Ensure all sensitive information that is being
“Have an audit or assessment on your data,” says
transferred or emailed is encrypted. Encryption
Greg Kelley, EnCE, DFCP, of Vestige Digital
should also be installed on all company laptops,
Investigations (Links to an external site.).
mobile devices and removable media.
“Everyone company is different. They have different
regulations, different types of data, different needs 9. Use a proxy.
for that data and a different company culture. Hire
an outside expert to assess what data you have, “That free internet at the airport or the cafe is
how you are protecting it (not how you think you are actually shared with dozens or hundreds or other
protecting it) and where that data is going. While users who might be sniffing your traffic,” says
you may think it is an unnecessary cost, if you Roberto Arias Alegria, IT Security Consultant
report to clients and potential clients that you have at Metaluxo IT Security (Links to an external site.).
had an outside data assessment, you may find it “Since encrypted connections (SSL) are far from
puts you at an advantage over your competitors.” universal, an easy to use proxy service can save
you from prying eyes (e.g. Zenmate, or
3. Restrict access to your sensitive data. TunnelBear).”
“Not everyone in the company needs access to 10. Activate two-factor authentication.
everything. Does the project manager need pricing
information? Does the sales person need “No matter how secure is your password, there’s
operations information? By restricting what data more than one way to get it. Consider using 2FA
each person has access to, you limit your exposure whenever you can, Google, Yahoo, Twitter and
when an employee decides what they want to steal many popular services already have support for
or when the employee’s account is compromised 2FA,” says Arias.
by an outsider,” says Kelly. 11. Restrict movement of information.
4. Enforce data privacy controls inside and out. “Do not permit the transfer of personal information
Hold third parties and contractors your company (names, Social Security numbers, Medicare
engages to the same strict data privacy controls numbers, employee or medical data etc.) to a
you implement in your own organization. Audit portable medium, like a laptop or mobile
them periodically to ensure compliance with your device. This data should be processed in-house,
security standards. not on an airplane or a commuter train or at home,”
says Robert Ellis Smith, Publisher, Privacy Journal.
5. Use strong passwords to protect computers
12. Take extra steps to protect your most
and devices.
sensitive data.
Make it difficult for outsiders to access your
company’s and employees’ devices and computers “Truncate Social Security numbers, or remove them
if they are lost or stolen by protecting them with from the data base and store them elsewhere apart
from the original data file, with a means to link the
two later if necessary. Regularly remove sensitive 18. Implement social media policies.
personal data from online databases or “the cloud”
and process it off-line,” says Smith.
13. Use anti-virus software and anti-spyware.

Update all software on your company’s network


whenever updates become available. This includes
security software, browsers, and operating
systems. Don’t use free security software as
sometimes these contain “scareware” that can fool
employees into compromising your network.
14. Require strong passwords for all
employees.

“More than 70 per cent of breaches are due to


weak passwords or poor password management,”
says Darren Guccione, CEO and co-founder
of Keeper Security, Inc. Make sure you use “Create, and enforce with technology, appropriate
passwords that are at least eight characters in social media policies. Don’t pretend that policies
length and utilize a combination of uppercase and alone will ensure that employees don’t make
lowercase letters, numerals and symbols.” inappropriate social media posts – you need
technology to help with this task as people make
15. Have a “clean desk” policy. mistakes – and they can be costly to your business.
Many breaches start with criminals crafting spear
Implement and enforce a policy prohibiting phishing emails based on overshared information
employees from keeping working papers, on social media,” says Steinberg.
passwords or any sensitive documents in view
while they are away from their desks. Every 19. Be prepared for mistakes.
workstation should have a lockable drawer for
employees to secure sensitive information. “Employees are humans, and humans make
mistakes,” says Quinn Kuzmich, adjunct professor
16. Guard against social engineering. of software security and computer forensics
at Colorado Technical University, founding partner
Teach employees to recognize and report attempts at NagaSec Information Security and a Senior IT
by outsiders to get information. Train them on the Security Analyst for Skillsoft. “Mistakes leave your
various techniques used by fraudsters, such as system vulnerable. And when it comes to data
“phishing” and “smishing” and to never open security, these mistakes happen all the time. Data
attachments or download anything from an gets saved in the wrong folders, which weren’t
unknown source. configured in the right way – this means the wrong
17. Beware of personal devices. people have access to the data. If you forget this
important rule, the wrong people will remind you.”
“Make sure that you have policies and technology
20. Be nice to others.
to address the risk of people bringing personal
devices to work,” says Joseph Steinberg, CEO A disgruntled individual can be the most dangerous
of SecureMySocial. “All access to the Internet from vulnerability in your company’s data protection
such devices – or from devices brought by visitors program.
to your office – should be done via a separate
network than is used for company computers. Many
routers come equipped with such a capability.
Personal devices can be infected with malware that Social Engineering Recognition
can steal data if the devices are connected to
corporate networks.” What is social engineering

Social engineering is the term used for a broad


range of malicious activities accomplished through
human interactions. It uses psychological
manipulation to trick users into making security Baiting scams don’t necessarily have to be carried
mistakes or giving away sensitive information. out in the physical world. Online forms of baiting
consist of enticing ads that lead to malicious sites
Social engineering attacks happen in one or more or that encourage users to download a malware-
steps. A perpetrator first investigates the intended infected application.
victim to gather necessary background information,
such as potential points of entry and weak security Scareware
protocols, needed to proceed with the attack. Then,
the attacker moves to gain the victim’s trust and Scareware involves victims being bombarded with
provide stimuli for subsequent actions that break false alarms and fictitious threats. Users are
security practices, such as revealing sensitive deceived to think their system is infected with
information or granting access to critical resources. malware, prompting them to install software that
has no real benefit (other than for the perpetrator)
or is malware itself. Scareware is also referred to
as deception software, rogue scanner software and
fraudware.
A common scareware example is the legitimate-
looking popup banners appearing in your browser
while surfing the web, displaying such text such as,
“Your computer may be infected with harmful
spyware programs.” It either offers to install the tool
(often malware-infected) for you, or will direct you
What makes social engineering especially to a malicious site where your computer becomes
dangerous is that it relies on human error, rather infected.
than vulnerabilities in software and operating
systems. Mistakes made by legitimate users are Scareware is also distributed via spam email that
much less predictable, making them harder to doles out bogus warnings, or makes offers for
identify and thwart than a malware-based intrusion. users to buy worthless/harmful services.

Social engineering attack techniques Pretexting

Social engineering attacks come in many different Here an attacker obtains information through a
forms and can be performed anywhere where series of cleverly crafted lies. The scam is often
human interaction is involved. The following are the initiated by a perpetrator pretending to need
five most common forms of digital social sensitive information from a victim so as to perform
engineering assaults. a critical task.

Baiting The attacker usually starts by establishing trust with


their victim by impersonating co-workers, police,
As its name implies, baiting attacks use a false bank and tax officials, or other persons who have
promise to pique a victim’s greed or curiosity. They right-to-know authority. The pretexter asks
lure users into a trap that steals their personal questions that are ostensibly required to confirm
information or inflicts their systems with malware. the victim’s identity, through which they gather
important personal data.
The most reviled form of baiting uses physical
media to disperse malware. For example, attackers All sorts of pertinent information and records is
leave the bait—typically malware-infected flash gathered using this scam, such as social security
drives—in conspicuous areas where potential numbers, personal addresses and phone numbers,
victims are certain to see them (e.g., bathrooms, phone records, staff vacation dates, bank records
elevators, the parking lot of a targeted company). and even security information related to a physical
The bait has an authentic look to it, such as a label plant.
presenting it as the company’s payroll list.
Phishing
Victims pick up the bait out of curiosity and insert it
into a work or home computer, resulting in As one of the most popular social engineering
automatic malware installation on the system. attack types, phishing scams are email and text
message campaigns aimed at creating a sense of
urgency, curiosity or fear in victims. It then prods
them into revealing sensitive information, clicking  Don’t open emails and attachments
on links to malicious websites, or opening from suspicious sources – If you don’t
attachments that contain malware. know the sender in question, you don’t
need to answer an email. Even if you do
An example is an email sent to users of an online know them and are suspicious about
service that alerts them of a policy violation their message, cross-check and confirm
requiring immediate action on their part, such as a the news from other sources, such as
required password change. It includes a link to an via telephone or directly from a service
illegitimate website—nearly identical in appearance provider’s site. Remember that email
to its legitimate version—prompting the addresses are spoofed all of the time;
unsuspecting user to enter their current credentials even an email purportedly coming from
and new password. Upon form submittal the a trusted source may have actually been
information is sent to the attacker. initiated by an attacker.
Given that identical, or near-identical, messages
are sent to all users in phishing campaigns,  Use multifactor authentication – One
detecting and blocking them are much easier for of the most valuable pieces of
mail servers having access to threat sharing information attackers seek are user
platforms. credentials. Using multifactor
authentication helps ensure your
Spear phishing account’s protection in the event of
system compromise. Imperva Login
This is a more targeted version of the phishing Protect is an easy-to-deploy 2FA
scam whereby an attacker chooses specific solution that can increase account
individuals or enterprises. They then tailor their security for your applications.
messages based on characteristics, job positions,
and contacts belonging to their victims to make
 Be wary of tempting offers – If an offer
their attack less conspicuous. Spear
sounds too enticing, think twice before
phishing requires much more effort on behalf of the
accepting it as fact. Googling the topic
perpetrator and may take weeks and months to pull
can help you quickly determine whether
off. They’re much harder to detect and have better
you’re dealing with a legitimate offer or a
success rates if done skillfully.
trap.
A spear phishing scenario might involve an attacker
who, in impersonating an organization’s IT  Keep your antivirus/antimalware
consultant, sends an email to one or more software updated – Make sure
employees. It’s worded and signed exactly as the automatic updates are engaged, or
consultant normally does, thereby deceiving make it a habit to download the latest
recipients into thinking it’s an authentic message. signatures first thing each day.
The message prompts recipients to change their Periodically check to make sure that the
password and provides them with a link that updates have been applied, and scan
redirects them to a malicious page where the your system for possible infections.
attacker now captures their credentials.
Social engineering prevention Online Fraud Protection

Social engineers manipulate human feelings, such What is “online fraud”?


as curiosity or fear, to carry out schemes and draw
victims into their traps. Therefore, be wary Fraud that is committed using the internet is “online
whenever you feel alarmed by an email, attracted fraud.”  Online fraud can involve financial fraud and
to an offer displayed on a website, or when you identity theft.
come across stray digital media lying about. Being Types of Online Fraud
alert can help you protect yourself against most The most common types of online fraud are called
social engineering attacks taking place in the digital phishing and spoofing.   Phishing is the process of
realm. collecting your personal information through e-mails
Moreover, the following tips can help improve your or websites claiming to be legitimate.   This
vigilance in relation to social engineering hacks. information can include usernames, passwords,
credit card numbers, social security numbers, etc.  
Often times the e-mails directs you to a website Protection Against Online Fraud
where you can update your personal information.  
Because these sites often look “official,” they hope 1. Know the Scams
you’ll be tricked into disclosing valuable information
that you normally would not reveal.   This often  Phishing, Spoofing, Pop-up Fraud –
times, results in identity theft and financial loss. types of online fraud used to obtain
personal information.
Spyware and viruses are both malicious programs  Trojan Horse – Virus that can record
that are loaded onto your computer without your your keystrokes. It can live in an
knowledge.   The purpose of these programs may attachment or be accessed via a link in
be to capture or destroy information, to ruin the email, website or pop-up window.
computer performance or to overload you with  Counterfeit Websites – URLs that
advertising.   Viruses can spread by infecting forward you to a fraudulent site. To
computers and then replicating.   Spyware validate a URL, you can type or cut and
disguises itself as a legitimate application and paste the URL into a new web browser
embeds itself into your computer where it then window and if it does not take you to a
monitors your activity and collects information. legitimate web site or you get an error
message, it was probably just a cover
Fraudulent “Pop-up Windows” are a type of online for a fraudulent web site.
fraud often used to obtain personal information.  
They are the windows or ads that appear suddenly
2. Activate a pop-up window blocker. 
over or under the window you are currently viewing.
There are free programs available online that will
Fraudulent websites or pop-up windows are used to
block pop-up windows.  Be sure to perform an
collect your personal information.   Other terms for
Internet search for “pop-up blocker” or look at the
the fraudulent process of gathering your personal
options provided by major search engines.   You
information include “Phishing or “Spoofing.”
will need to confirm that these programs are from
Additional links to real websites can be
legitimate companies before downloading.   Once
incorporated into the email to lead you to believe
you have installed a pop-up blocker, you should
the email is legitimate.
determine if it blocks information that you need to
Fraudulent websites, e-mails or pop-up view or access.   If this is the case, you should
windows will often: consider turning off the blocker when you are on
Web sites you know use pop-up windows to
 Ask you for personal information provide information you need or want to view.
(Account number, Social Security
Number, Date of Birth, etc.). 3. Scan your computer for spyware regularly.
 Appear to be from a legitimate source You can eliminate potentially risky pop-up windows
(Retail Stores, Banks, Government by removing any spyware or adware installed on
agencies, etc.). your computer.   Spyware and adware are
 Contain prizes or other types of programs that look in on your Web viewing activity
certificate notices. and potentially relay information to a disreputable
 Link to other real or counterfeit source. Perform an Internet search for “spyware” or
websites. “adware” to find free spyware removal programs.  
 Contain fraudulent phone numbers. As with a pop-up blocker, you will want to be sure
that your removal program is not blocking, or
Pop-up windows are often the result of programs removing, wanted items, and if it is, consider
installed on your computer called “adware” or turning it off for some websites.
“spyware.”   These programs look in on your Web
viewing activity and regularly come hidden inside 4. Avoid downloading programs from unknown
many free downloads, such as music-sharing sources.
software or screen savers.  Many of these Downloads may contain hidden programs that can
programs enable harmless advertisements, but compromise your computer’s security.  Likewise,
some contain “Trojan horse” programs that can email attachments from unknown senders may
record your keystrokes or relay other information to contain harmful viruses.
an unauthorized source.
5. Keep your computer operating system and
  Internet browser current.
acting with the best intentions, phishing email
6. Keep anti-virus software up-to-date. victims respond without thinking twice about it.
Anti-virus software needs frequent updates to
guard against new viruses.   Select a reputable In a phishing email, cybercriminals will typically
provider. Download the anti-virus updates as soon ask for your:
as you are notified that a new program update is
available, or flag your program to download and  Date of birth
install the updates automatically if that option is  Social security numbers
available.  Phone numbers
 Credit card details
7. Keep your passwords secret.
 Home address
Change them regularly, using a mixture of numbers
 Password information (or what they
and characters.
need to reset your password
Phishing Protection
This information is then used by cybercriminals
Phishing is a cybercrime in which a target or to impersonate the victim and apply for credit
targets are contacted by email, telephone or cards or loans, open bank accounts, and other
text message by someone posing as a fraudulent activity.
legitimate institution to lure individuals into
Some cybercriminals use the information
providing sensitive data such as personally
collected by a phishing email to start a more
identifiable information, banking and credit card
targeted cyber attack, such as a spear
details, and passwords.
phishing (Links to an external site.) or business
The information is then used to access email compromise incident, that relies on
important accounts and can result in identity knowing more about the victim.
How Does Phishing Happen?
The data doesn’t lie – phishing is still alive and
well in 2020, even if your web connection or Phishing happens when a victim replies to a
email client is secured. fraudulent email that demands urgent action.
According to a 2019 Verizon report (Links to an Examples of requested actions in a phishing
external site.), 32% of all data breaches email include:
involved phishing in one way or another. In
addition, 90% of confirmed (Links to an  Clicking an attachment
external site.) phishing email attacks took place  Enabling macros in Word document
in environments that used Secure Email  Updating a password
Gateways (SEGs).  Responding to a social media
connection request
Being able to consistently detect and avoid  Using a new wi-fi hot spot.
phishing email attempts that land in your inbox
is a key component of strong cyber security. To Every year, cybercriminals become savvier
do that, it’s important to understand the with their phishing attacks and have tried-and-
different types of phishing emails and the tested methods to deceive and steal from
warning signs to look for in each scenario. innocent victims. Because phishing attacks
come in many different forms, differentiating
What is a Phishing Email?
one from a valid email, voice mail, text
A phishing email is a cybercrime that relies on message, or information request can be
deception to steal confidential information from difficult.
users and organizations. This is why phishing simulations are an ideal
Phishing victims are tricked into disclosing way to measure phishing awareness. Using
information they know should be kept private. a phishing simulation (Links to an external
However, because they trust the source of the site.) to test users is instrumental in increasing
information request and believe that party is
organization-wide levels of phishing and cyber CEO Fraud
security awareness
This example of a phishing attack uses an email
Examples of Different Types of Phishing address that is familiar to the victim, like the one
Attacks belonging to the organization’s CEO, Human
Resources Manager, or the IT support department.
Just like everything else on the internet, The email urgently asks the victim to act and
phishing email attacks have evolved over the transfer funds, update employee details, or install a
years to become more intricate, enticing, and new app on their computer.
tougher to spot.
Content Injection
To successfully pinpoint and flag suspicious
Savvy cybercriminals hack a familiar website and
messages in their inbox, all your users must be include a fake website login page or pop-up that
familiar with the different forms a phishing directs website visitors to a fake website.
email can take on.
Session Hijacking
Phishing Email
With this advanced phishing attack, criminals gain
Phishing emails still comprise a large portion of the access to a company web server and steal the
world’s yearly slate of devastating data breaches. confidential information stored on the server.
Phishing emails are designed to appear to come
from a legitimate source, like Amazon customer Malware
support, a bank, PayPal, or another recognized
organization. Cybercriminals hide their presence in All it takes to install malicious software on a
little details like the sender’s URL, an email computer or company network is clicking an email
attachment link, and more. attachment. These attachments look valid or may
even be disguised as funny cat videos, eBook
Spear Phishing PDFs, or animated GIFs.

This more targeted phishing email attack relies on “Evil Twin” Wi-Fi
data that a cybercriminal has previously collected
about the victim or the victim’s employer. Typically This occurs when free Wi-Fi access points are
spear phishing emails use urgent and familiar spoofed. Victims unknowingly log into the wrong
language to encourage the victim to act Wi-Fi hotspot. Wi-Fi access points that are
immediately. commonly spoofed include those available in coffee
shops, airports, hospitals, shopping malls, public
Link Manipulation parks, and other public gathering locations.
Relying on carefully worded phishing emails, this Mobile Phishing (Smishing)
type of attack includes a link to a popular. This link
takes victims to a spoofed version (Links to an A fraudulent SMS, social media message, voice
external site.) of the popular website, designed to mail, or other in-app message asks the recipient to
look like the real one, and asks them to confirm or update their account details, change their
update their account credentials. password, or tells them their account has been
Fake Websites violated. The message includes a link that is used
to steal the victim’s personal information or installs
Cybercriminals send phishing emails that include malware on the mobile device.
links to fake websites, such as the mobile account
login page for a known mail provider, asking the Voice Phishing (Vishing)
victim to enter their credentials or other information This occurs when a caller leaves a strongly worded
into the fake site’s interface. The nefarious website voicemail that urges the recipient to respond
will often leverage a subtle change to a known URL immediately and to call another phone number.
to trick users, such as mail.update.yahoo.com These voicemails are urgent and convince the
instead of mail.yahoo.com. victim for example, that their bank account will be
suspended if they don’t respond.
Man-In-The-Middle victim to fake PayPal website and the stolen credit
card information is used to commit further crimes.
This sophisticated phishing email attack tricks two
people into believing that they’re emailing each Compromised Credit Card
other. However, the phisher is sending fake emails
to each person asking them to share information or The cybercriminal knows the victim made a recent
to update confidential corporate information. purchase at Apple for example, and sends an email
disguised to look like it is from Apple customer
Malvertising support. The email tells the victim that their credit
card information might have been compromised
This phishing technique uses online advertisements and to confirm their credit card details to protect
or pop-ups to compel people to click a valid-looking their account.
link that then installs malware on their computer.
Transfer Funds
Real-World Examples of Phishing Email Attacks
An urgent email arrives from the company CEO
One common thread that runs through all types of who is currently traveling. The email asks the
phishing emails, including the examples below, is recipient to help out the CEO by transferring funds
the use of social engineering tactics. Like most to a foreign partner. This phishing email tells the
phishing attacks, social engineering preys on the victim that the fund request is urgent and necessary
natural human tendency to trust people and to secure the new partnership. The victim doesn’t
companies. hesitate to transfer the funds, believing she is
helping both the company and the CEO.
This leads to many users failing to carefully review
phishing email details and automatically trusting the Social Media Request
sender’s request. Email phishing victims believe
they’re helping their organizations by transferring  A Facebook friend request arrives from someone
funds, updating login details, or providing access to who has the same Facebook friends as you. You
proprietary data. don’t immediately recognize the person but assume
the request is legitimate because of the common
friends. This new friend then sends you a Facebook
message with a link to a video which when clicked
installs malware on your computer and potentially
the company network.
Fake Google Docs Login

A cybercriminal creates a fake Google Docs login


page and then sends a phishing email hoping to
trick someone into logging into the faked website.
The email might read “We’ve updated our login
credential policy, please confirm your account by
logging into Google Docs.” The sender’s email is a
faked Google email address, for
example accountupdate@google.org.com.

 
 
Make sure your colleagues are aware of these
common examples of phishing emails:
Account Deactivation

An email from PayPal arrives telling the victim that


their account has been compromised and will be
deactivated unless they confirm their credit card
details. The link in the phishing email takes the
phishing emails, social engineering, and
cyber security.
4. Incorporate: make cyber security
awareness campaigns, training, support,
education, and project management part
of your corporate culture.

Malware Protection
Malware is the collective name for a number of
malicious software variants, including viruses,
ransomware and spyware. Shorthand for malicious
software, malware typically consists of code
developed by cyberattackers, designed to cause
extensive damage to data and systems or to gain
unauthorized access to a network. Malware is
typically delivered in the form of a link or file over
email and requires the user to click on the link or
Company Tech Support Request open the file to execute the malware.
Employees receive an email from corporate IT Malware has actually been a threat to individuals
asking them to install new instant messaging and organizations since the early 1970s when the
software. The email looks real, however a spoofed Creeper virus first appeared. Since then, the world
email address is used support@acme.com instead has been under attack from hundreds of thousands
of internalsupport@acme.com. When employees of different malware variants, all with the intent of
install the software, ransomware is installed on the causing the most disruption and damage as
company network. possible.
Each of these phishing attack examples highlights What Can Malware Do?
how easy it is to be tricked by an email. The more
familiar people are with how phishing happens, the Malware delivers its payload in a number of
easier it is foster a cyber security aware culture. different ways. From demanding a ransom to
stealing sensitive personal data, cybercriminals are
becoming more and more sophisticated in their
methods.
How To Protect Against Phishing Emails
Types of Malware:
To protect against phishing emails, you need to
raise awareness of how phishing happens. When Virus
people experience first-hand how easy it is to be
tricked by what looks like a valid email, they are Possibly the most common type of malware,
more likely to carefully review email details before viruses attach their malicious code to clean code
automatically clicking Reply, an embedded link, or and wait for an unsuspecting user or an automated
downloading an attachment. process to execute them. Like a biological virus,
they can spread quickly and widely, causing
To protect against phishing emails, remember damage to the core functionality of systems,
these five keys to building a cyber secure aware corrupting files and locking users out of their
culture: computers. They are usually contained within an
executable file.
1. Educate: use security awareness
training and phishing microlearnings to Worms
educate, train, and change behavior.
2. Monitor: use phishing simulation tools Worms get their name from the way they infect
to monitor employee knowledge and to systems. Starting from one infected machine, they
identify who is at risk for a cyber attack. weave their way through the network, connecting to
3. Communicate: provide ongoing consecutive machines in order to continue the
communications and campaigns about spread of infection. This type of malware can infect
entire networks of devices very quickly.
Spyware  Get an ad-blocker! Malvertising –
where hackers use infected banners or
Spyware, as its name suggests, is designed to spy pop-up ads to infect your device – is on
on what a user is doing. Hiding in the background the rise. You can’t know which ads are
on a computer, this type of malware will collect bad: so it’s safer to just block them all
information without the user knowing, such as with a reliable ad-blocker.
credit card details, passwords and other sensitive
information.  Careful where you browse! Malware
can be found anywhere, but it’s most
Trojans common in websites with poor backend
Just like Greek soldiers hid in a giant horse to security, like small, local websites. If you
deliver their attack, this type of malware hides stick to large, reputable sites, you
within or disguises itself as legitimate software. severely reduce your risk of
Acting discretely, it will breach security by creating encountering malware.
backdoors that give other malware variants easy
access. Identity Theft Prevention
Ransomware What is Identity (ID) Theft?

Also known as scareware, ransomware comes with Identity theft occurs when an unauthorized party
a heavy price. Able to lockdown networks and lock uses your personally identifying information, such
out users until a ransom is paid, ransomware has as your name, address, Social Security
targeted some of the biggest organizations in the Number (SSN), or credit card or bank
world today — with expensive results. account information to assume your identity
in order to commit fraud or other criminal acts.
How Does Malware Spread?
How does identity theft occur? Identity thieves can
Each type of malware has its own unique way of steal your personal information directly or indirectly
causing havoc, and most rely on user action of
by:
some kind. Some strains are delivered over email
via a link or executable file. Others are delivered via • Stealing your wallets and purses containing
instant messaging or social media. Even mobile identification cards, credit cards and
phones are vulnerable to attack. It is essential that bank information.
organizations are aware of all vulnerabilities so they
can lay down an effective line of defense. • Stealing your mail including credit and bank
statements, phone or utility bills, new checks,
How to protect against malware
and tax information.
When it comes to malware, prevention is better • Completing a “change of address form” to redirect
than a cure. Fortunately, there are some common
the destination of your mail.
sense, easy behaviors that minimize your chances
of running into any nasty software. • Rummaging through your trash for discarded
personal data in a practice known as
 Don’t trust strangers online! “Social
engineering”, which can include strange “dumpster diving.”
emails, abrupt alerts, fake profiles, and • Taking personal information that you share or post
curiosity-tickling offers, are the #1 on the Internet.
method of delivering malware. If you
don’t know exactly what it is, don’t click What can ID thieves do with your information?
on it.
• Call your creditors and change your mailing
 Double-check your downloads! From address on your credit card account.
pirating sites to official storefronts,
malware is often lurking just around the • Open new lines of credit using your personal
corner. So before downloading, always identification information.
double-check that the provider is
trustworthy by carefully reading reviews • Establish phone services using your name which
and comments. are charged to you.
• Open bank accounts in your name and write bad
checks.
• Forge checks to wipe out your bank account.
• Apply for auto loans taken out in your name.
• Commit other crimes and then give your name,
instead of their own, to the police during
their arrest.
What you can you do to prevent ID theft?
Identity theft is on the rise. While there are no
guarantees that your identity will not be stolen there
are steps you can take to minimize your risk.
• Use passwords on all your credit card, bank, and
phone accounts.
• Never keep passwords, “PINs” or your SSN card
in your wallet or purse.
• Learn about security procedures in your
workplace.
• Never give out personal information on the
phone, through mail, or over the internet unless you
know the receiver and have initiated the contact.
• Guard your mail and trash from theft.
• Shred or destroy discarded financial statements in
your trash.
• Give your SSN only when absolutely necessary.
• Keep your purse or wallet in a safe place at work.
How can you protect your personal computer from
ID theft?
SSNs, financial records, tax information, birth
dates, and account numbers may be stored on you
personal computer.Follow these tips to help keep
your personal information safe.
• Update your virus protection software regularly,
especially when a new virus alert is brought to your
attention.
• Do not download files from strangers or click
hyperlinks from people you don’t know. This could
expose your system to a virus.

You might also like