02.11.2021 Views

Cyber Defense eMagazine November Edition for 2021

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How to protect yourself from cyber attacks?<br />

The only way to effectively fight back against cyber attacks is by implementing a cyber security plan which<br />

includes various tools and policies that make it impenetrable. Let us introduce you to everything you need<br />

to know to fight against cyber attacks and how to implement it in your cyber security plan.<br />

Implement device fingerprinting<br />

One of the tools that should be added to any security is device fingerprinting. In short, device<br />

fingerprinting is a process of collecting and analysing different variables of users’ devices like its software<br />

and hardware configurations to create a unique user profile. SEON’s view on device fingerprinting, shows<br />

us how crucial it can be in fighting against cyber attacks. By creating a unique profile or device fingerprint<br />

<strong>for</strong> each user you can recognize when some of the variables change and confirm if it is a legitimate<br />

change in user details or suspicious behaviour. This way you can stop the fraud attempt be<strong>for</strong>e it even<br />

happens.Use multi-factor authentication<br />

This is a great tool to use to provide an extra layer of security, especially when used together with device<br />

fingerprinting. It asks users to provide extra verification be<strong>for</strong>e giving them access to their accounts, like<br />

a special code being sent to the user's device. This can come especially handy if there is a difference in<br />

users device fingerprint, as it can confirm if they are legitimate users or if they are attempting an account<br />

takeover.<br />

Train your employees<br />

Your employees are the most important element of your business, and also its biggest security risk. Most<br />

of the cyber attacks will try to use the human element of the business in order to get access to confidential<br />

data like their credentials, bank account details, or even intellectual property. This is why it is extremely<br />

important to educate your employees about what are the cyber threats and risks, how to recognize them,<br />

and how to fight against them. Report to cyber threats from Netwrix, explains that 58% of all organizations<br />

claimed that their employees do not follow cyber security guidelines. Truth is that if you are not proactive<br />

about the fight against cyber attacks, neither will your employees be, regardless of your guidelines,<br />

especially if nobody is en<strong>for</strong>cing them. This is why it is extremely important to have a clear and easy to<br />

understand cyber security policy and to keep your employees in<strong>for</strong>med about emerging threats.<br />

Introduce the password policy<br />

This step might seem small, but it can make an enormous difference in your cyber security plan. Did you<br />

know that 81% of hacking-related breaches happened due to stolen and/or weak passwords?<br />

Considering that a large number of people use either the same or similar passwords <strong>for</strong> all of their<br />

accounts, one breach can cause a domino effect and put all of the other accounts in danger. Introducing<br />

password policy <strong>for</strong> your employees and also your users can significantly reduce the risk of data breach.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2021</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!