01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Regardless of their size, organizations are facing similar types of attacks — social engineering, system<br />

intrusion, and basic web application attacks. <strong>The</strong> top cybersecurity attacks affecting SMBs specifically,<br />

according to the Verizon report, are:<br />

• Human element. <strong>The</strong> number one risk to any SMB is its own people. In fact, 74 percent of<br />

breaches involved human actions, whereby adversaries use social engineering and<br />

misrepresentation tactics to steal data or hold businesses ransom. Pretexting, an invented<br />

scenario that tricks someone into giving up in<strong>for</strong>mation, accounted <strong>for</strong> half of all social engineering<br />

incidents in 2022. Phishing tactics came in second, at 44 percent.<br />

• Ransomware. Using malware to block access to a computing system, ransomware was present<br />

in over 62 percent of all incidents.<br />

• Denial of Service (DDoS). <strong>The</strong>se attacks compromise the availability of networks and systems<br />

by overwhelming them with large amounts of data. DDoS attacks represented 42 percent of<br />

incidents.<br />

• System intrusion. This technique, which involves bad actors using their expertise in hacking and<br />

malware to breach or impact organizations, accounted <strong>for</strong> 37 percent of breaches. This is a<br />

category that differs from ransomware and the human element, as it’s a more sophisticated,<br />

calculated and targeted type attack.<br />

Seven Ways to Strengthen Your <strong>Cyber</strong>security Posture with Fewer Resources<br />

If a business leverages technology, they have a cybersecurity problem. For SMBs, who already have an<br />

uphill battle, it’s vital that they have the right cybersecurity protocols in place to mitigate risks. Here are<br />

seven techniques even the smallest business can implement:<br />

1. Manage who has access to your data. Access control management uses processes and tools to<br />

create, assign, manage and revoke access credentials and privileges <strong>for</strong> users of assets and<br />

software.<br />

2. Train your employees to be security savvy. Establish and maintain a security awareness program<br />

<strong>for</strong> your work<strong>for</strong>ce (even if it is a team of five) to be security conscious and reduce cybersecurity<br />

risks.<br />

3. Know where your data resides. Is your organization’s data stored on a network, on hard drives,<br />

on servers, in the cloud? Do you rely on third parties? Knowing where your data resides is helpful<br />

so you can better protect it and know what steps to take if data has been compromised.<br />

4. Create an incident response management plan. Many cyberattacks, such as pretexting, tend to<br />

escalate quickly and can have a significant impact. A plan will help an organization better prepare,<br />

detect, and respond to an attack.<br />

5. Ask questions. Here are a few good questions to start with:<br />

o Do we have a designated in<strong>for</strong>mation security expert on staff or a third-party trusted risk<br />

advisor?<br />

o Is our website properly protected?<br />

o Do we regularly back up our data and files?<br />

o Are our company’s devices protected with antimalware and antivirus software?<br />

o Do we regularly patch our hardware and software?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!