01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Different Types of Risk Exposure<br />

<strong>The</strong>re is an undeniable lack of oversight and control over who has access to sensitive data within the IT<br />

estate during the layoff process. Bad actors are increasingly targeting SaaS applications because they<br />

store precious data. Because of this, there are many different types of risk exposure that organizations<br />

face when employees are laid off.<br />

<strong>The</strong> widespread enterprise adoption of cloud-first business strategies has significantly increased the<br />

amount of SaaS applications created and used by organizations. Businesses frequently use multiple<br />

cloud-based applications such as Google Drive or Slack to collaborate, store data, and share files with<br />

colleagues or clients. Although these applications are beneficial in some ways, the collaborative nature<br />

can pose serious security risks to organizations because sensitive data is frequently stored within these<br />

applications. File owners can easily share access with their personal emails or external parties with just<br />

one click. In a recent report by DoControl, it was revealed that 61% of employees have previously shared<br />

company-owned assets with their own email. Once this file is shared publicly, there’s no telling who else<br />

might gain access to the data within.<br />

Complications also arise as business users continue to use messaging SaaS applications such as Slack<br />

or Microsoft Teams to communicate and exchange in<strong>for</strong>mation. Private data such as PII, passwords, and<br />

financial in<strong>for</strong>mation are often shared between coworkers on these plat<strong>for</strong>ms. This leaves sensitive data<br />

exposed <strong>for</strong> internal and external parties to take advantage of. Moreover, once employees are laid off,<br />

they become prime targets <strong>for</strong> cybercriminals to target <strong>for</strong> social engineering attacks. Bad actors or<br />

competitors might offer <strong>for</strong>mer employees money to share private, company-owned data. If business<br />

leaders conduct layoffs abruptly without offering a reason or severance, laid off employees might also be<br />

frustrated and have incentive to leak data <strong>for</strong> their own personal gain.<br />

Best Practices <strong>for</strong> Protecting Your Data<br />

Especially during this season of mass layoffs, businesses must take a proactive approach to protect<br />

confidential or proprietary in<strong>for</strong>mation and avoid leakage of sensitive company data. As more<br />

organizations adopt cloud-first SaaS operations, IT leaders will need to reevaluate their security posture<br />

and implement strict access permissions. Security teams should frequently monitor <strong>for</strong> suspicious activity<br />

and file sharing, and ensure that only necessary personnel have access to sensitive data. It is also<br />

imperative <strong>for</strong> businesses to revoke access to shared files as soon as employment status is changed.<br />

Most threats can be prevented with modern SaaS security tools <strong>for</strong> specific use cases, such as Data<br />

Loss Prevention (DLP), Cloud Access Security Broker (CASB), and Insider Risk Management (IRM)<br />

solutions. Additionally, training employees on best practices <strong>for</strong> data security will go a long way. IT<br />

security teams should emphasize company policies during layoffs and remind employees that data<br />

security is a shared responsibility. <strong>The</strong> cybersecurity threat of data leakage will likely continue to rise in<br />

line with layoffs. Organizations should look to navigate this process with better empathy, and be more<br />

proactive in their approach.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 116<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!