Best

now browsing by tag

 
 

3 best #practices for a #layered #cybersecurity #program

Source: National Cyber Security – Produced By Gregory Evans

As the circumstances surrounding WannaCry, Petya/Goldeneye, the Shadow Brokers and exposed voters’ records have shown, cybersecurity events continue to cripple companies no matter their size or industry.

Although cybersecurity is both broad and complex, some best practices can help prevent hackers from successfully infiltrating your customers’ operations. A mature cybersecurity program relies on a layered security approach — meaning that no single control is the only source of protection for a corporate asset. Three controls that make up a layered security approach are secure password practices, multi-factor authentication and security awareness training.

Secure password practices

For many people, it’s difficult to remember unique, complex passwords for every website — a complication that leads to password reuse. Unfortunately, cyber criminals recognize this as a normal occurrence. When your credentials are compromised on one site, they will take that username and password and try it other places, with success.

As a solution, use a password manager tool. These services ask you to remember one master password and, through a browser extension, will automatically log you in to all of the websites you visit using a longer, more complex password that you don’t need to know. What’s the advantage? If a company, such as your bank, is compromised, the stolen password only allows access to your bank and nowhere else.

Steps to multi-factor authentication

Multi-factor (or two-factor) authentication (MFA or 2FA) is more straightforward than how it may initially seem. MFA is a combination of two of these three factors:

Something you know: a piece of information that you have memorized, such as a password.

          1. Something you have: Historically, this was a physical token that displays a 6-digit number, which changed every 30 seconds. Today, this method uses app on a user’s smartphone. In either case, it is not necessary for the owner to memorize the multi-digit code, provided that they have the device or app with them when logging in.
          2. Something you are: biometrics, such as a smartphone’s built-in fingerprint reader.
          3. Something you are: biometrics, such as a smartphone’s built-in fingerprint reader.

When MFA is used, it becomes much more difficult for an attacker to gain unauthorized access to an account. Not only would he or she need to steal your password, but the criminal would also need to physically steal, or hack into, your token device or biometric data, both of which are far more difficult tasks. An additional best practice is to use MFA on all remote connectivity, and for any activity requiring administrator-level access.

Creating security awareness

Your customers can be their companies’ strongest security assets or weakest links. Employees who click on malicious links and open attachments can easily bypass other cyber protections. Phishing attacks, situations in which an employee receives a legitimate-appearing, but actually malicious email, are one of the top causes of data breaches.

Ten years ago, phishing attacks came from a “Nigerian prince” and were easy to identify. These days, attacks are much more sophisticated and are timed with current events, such as business transactions or the April 15 tax day. Attackers also will take time to create “spear phishing” attacks, in which a specific person or company is targeted. Spear phishing uses information from a user’s LinkedIn page or other social media accounts to appear plausible.

Your customers should regularly conduct security awareness training for employees. Training should include regular communications on current security events and in-house phishing campaigns performed on a frequent basis. The in-house campaigns test employees with seemingly realistic phishing emails that, thankfully, are anything but.

Criminals will always be thinking of new ways to attack businesses and consumers, which forces businesses to constantly evolve their cybersecurity practices. It is only through constant vigilance that we can continue to protect ourselves in this ever-escalating environment.

 

The post 3 best #practices for a #layered #cybersecurity #program appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Best Practices for Cybersecurity Are Simple and Keep Users in Mind

Source: National Cyber Security – Produced By Gregory Evans

As students, faculty and staff settle into the routines of a new semester, it’s the perfect time for a refresher on cybersecurity. Perhaps this is why October is designated National Cybersecurity Awareness Month. CIOs and CISOs have an opportunity to educate users on the basics of good cyberhygiene before they…

The post Best Practices for Cybersecurity Are Simple and Keep Users in Mind appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cybersecurity Best Practices for Small Businesses

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans The impact of the Equifax data breach that compromised the personal data of over 145 million individuals has left many confused, frustrated and downright angry. And while massive attacks on large corporations make headlines, small businesses have just as much, if not more, at stake. According […] View full post on AmIHackerProof.com | Can You Be Hacked?

Hacking Doesn’t Effect the Best Online Trading Sites

Source: National Cyber Security – Produced By Gregory Evans

The Internet is a wonderful resource for doing business; but the fact remains that there is a need for security of online transactions. Online transactions are vulnerable and everyone who does business on the Net has a responsibility to make it safe for its e-commerce customers. Certainly, the Internet community…

The post Hacking Doesn’t Effect the Best Online Trading Sites appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

AI vs AI: New algorithm automatically bypasses your best cybersecurity defenses

Source: National Cyber Security – Produced By Gregory Evans

At DEF CON this past weekend Hyrum Anderson of security firm Endgame demonstrated an alarming AI application: modifying malware to defeat machine learning antivirus software. The core premise of Endgame’s experiment was that every AI has blind spots, and those blind spots can be exploited by other AI. By hammering…

The post AI vs AI: New algorithm automatically bypasses your best cybersecurity defenses appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

4 Cybersecurity Best Practices to Bolster Small Business Defenses

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans As cybervillains intensify efforts to crack into your networks and devices, here’s how to keep your data safe. Through its exercise videos and nutritional shakes and supplements, Beachbody helps people get buff, lose weight and live healthier lives. In fact, … The post 4 Cybersecurity Best […] View full post on AmIHackerProof.com | Can You Be Hacked?

The best dating apps and sites for men in 2017

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ Gone are the days when a subscription to an online dating site came with a free, complimentary stigma. According to the latest data from Match.com, almost half of singles in the …

The post The best dating apps and sites for men in 2017 appeared first on Become007.com.

View full post on Become007.com

The World’s Best And Worst Presented With A Well-Designed Infographic

Source: National Cyber Security – Produced By Gregory Evans

The World’s Best And Worst Presented With A Well-Designed Infographic

Countries with the best (blue) and worst (red) malware infection rates.[/caption] It’s no secret that online security is a global problem. Businesses and government agencies are hacked, corporations, hospitals and individuals are held up with ransomware, credit card numbers and …

The post The World’s Best And Worst Presented With A Well-Designed Infographic appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Best ways to avoid identity fraud

Source: National Cyber Security – Produced By Gregory Evans

Best ways to avoid identity fraud

Drivers lined up at the Regional Market on Thursday morning to get rid off all their personal documents.

The AARP offered the free shredding event. Shredding personal documents is one of the simplest ways to protect yourself from identity theft.

The AARP says every two seconds, someone’s identity is stolen and disposing of documents with your social security number, bank account information, even your address can make all the difference.

14 other free shredding events will be happening across New York — all part of state’s “operation stop scams” initiative.

Shredding services are being performed by third parties. All documents and information provided for shredding are subject to those parties’ privacy and informational security policies

For those who cannot attend an Operation: Stop Scams event, security experts urge consumers to shred the following types of materials to avoid having sensitive information compromised:

Old documents: Papers that carry your Social Security number, birth date, signature, account numbers, passwords or PIN numbers.
Banking: Canceled or unused checks. Shred deposit slips and ATM and credit card receipts, once you receive your monthly statements.
Credit Cards: Preapproved credit card applications and incentive/gift checks from credit card companies.
Medical: unneeded medical bills.
Investments: Investment account statements.
Obsolete ID cards: Expired driver’s licenses, medical insurance cards and passports.

Source:

The post Best ways to avoid identity fraud appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The Best Modern Love Hack: Dating Offline

For years, I was a serial one date online dater with countless horror stories (Naked with the Dog, You couldn’t even turn off the porn?). It became one of the primary reasons I started my blog, YOU’RE JUST A DUMBASS. Online dating was supposed to provide all of these options, make my dating life more efficient, and fun; instead I would get frustrated and disconnect after just a few months. “The majority of the time, the dates I’d go on with these guys from apps were disappointing”. Read More….

The post The Best Modern Love Hack: Dating Offline appeared first on Dating Scams 101.

View full post on Dating Scams 101