02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

usiness to maintain complete, centralised management of the system at all times and there<strong>for</strong>e ensure<br />

complete control.<br />

3. Ensure you are reducing malware exposure<br />

Malware infections is frequently linked to user mistakes. Phishing and spoofing schemes have advanced<br />

to the point where they can trick users into downloading innocuous-looking apps that contain hidden<br />

attacks by sending them fake emails from trusted brands. These emails lure users in with fake news<br />

stories, or very personalised offers, which leaves themselves and their companies open to attack. As well<br />

as this in the past year there has been an increase in ‘smishing’ attacks which are threatening businesses<br />

worldwide. Smishing is a <strong>for</strong>m of ‘phishing’ using SMS or text messages instead of emails to entice<br />

recipients to click on fake links which downloads malware onto their device.<br />

On their own devices, users cannot be prevented from surfing the web, utilising social media, or<br />

accessing personal email. How can you assist them in per<strong>for</strong>ming these routine duties in a safer manner?<br />

Request that all staff read basic instructions and/or participate in training that covers common malware<br />

attack strategies.<br />

Employers should also teach users to double-check URLs in emails to ensure they are accurate, relevant,<br />

and trustworthy. Also, think about deploying email security solutions that can help prevent malware and<br />

phishing attacks from reaching employees' inboxes. It makes no difference if you have the world's most<br />

secure security system. It only takes one inexperienced employee to be deceived by a phishing attempt<br />

and hand up the in<strong>for</strong>mation you've worked so hard to safeguard. Make sure you and your staff are both<br />

aware of these specific email phishing examples, as well as all of the warning indicators of a phishing<br />

attempt.<br />

4. Back everything up regularly<br />

What if your organisation already has a backup system in place? First and <strong>for</strong>emost, kudos on a job well<br />

done; but, the task does not end there. It's critical to test your backup recovery process on a frequent<br />

basis. It's pointless to back up data if you can't recover it. You'll know if your backup procedure is working<br />

properly if you run that test on a frequent basis. It's not uncommon <strong>for</strong> a backup drive to run out of disc<br />

space <strong>for</strong> no one to notice.<br />

Per<strong>for</strong>ming a proper backup can be a challenging task. There<strong>for</strong>e, backups should be included in your<br />

business continuity plan. A business continuity plan, according to Travelers Insurance, is "a proactive<br />

plan to avoid and manage risks associated with a disruption of operations."<br />

It outlines the measures that must be per<strong>for</strong>med be<strong>for</strong>e, during, and after an event in order <strong>for</strong> an<br />

organisation's financial viability to be maintained. That implies that if your business systems are affected,<br />

whether by a fire or flood in the office or, more recently, a cyber-attack, you'll have a plan in place to<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!