02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

sites like Facebook or LinkedIn. <strong>Cyber</strong>criminals use this in<strong>for</strong>mation to develop targeted scams designed<br />

to trick new employees into sharing valuable data or login credentials, and even wiring money.<br />

According to the FBI, $26 billion has been lost to these kinds of business email compromise attacks since<br />

2016. In one costly example, a scammer posed as the CEO to trick an employee into transferring $17.2<br />

million to a Shanghai bank account as part of a fake deal to acquire another company. New employees<br />

in particular may not be familiar with their new CEO and what type of request is abnormal or suspicious,<br />

so it’s important to train them quickly and effectively.<br />

Comprehensive cybersecurity training should be part of the early onboarding process <strong>for</strong> all new<br />

employees to help avoid these data security risks. Training should be tailored specifically to the unique<br />

needs and risk factors of new and remote employees and delivered in real-time rather than at mandatory<br />

quarterly trainings. Basic security hygiene can also be effective at preventing data loss. New and existing<br />

employees should be consistently reminded of best practices and what to look <strong>for</strong> in a suspicious email.<br />

Data security and hiring challenges are intertwined<br />

No matter the issue — hiring new staff, addressing turnover, or preventing burnout among employees<br />

that stay in their roles — IT and security teams must be brought in so that data security impacts are<br />

<strong>for</strong>eseen and addressed. In these instances, securing the “human layer,” or the employees that handle<br />

a company’s most sensitive data, should be a priority.<br />

Securing important communications channels like email and establishing real-time, automated<br />

cybersecurity training <strong>for</strong> employees is an important part of the solution. Empower employees to work<br />

both productively and securely by making them part of the solution. Encourage them to report mistakes<br />

or suspicious activity to the IT and security team without fear of repercussions. When an employee<br />

resigns, make sure to walk through data security policies and set clear expectations to avoid inadvertent<br />

exfiltration. By building these processes into the full lifecycle of an employee’s experience, organizations<br />

can help prevent The Great Resignation from turning into a data security nightmare.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!