“Cyber Security Awareness” – A priority among employees

12 Ways To Create An Unmissable Cyber Security Awareness Campaign

Cyber security awareness is an essential part of something that can be considered equivalent to the vault that has all your valuables in it. It is extremely vulnerable and requires attention. Since the last decade, cyber-criminals have shifted their focus from individuals to employees within organizations. These attacks have cost billions of dollars in thousands of reported cases. Some of the most infamous cases include:

Target

Arrows in the target clipart. Free download transparent .PNG | Creazilla

In 2013, Target became the victim of a third-party credit card data breach in which the vendor extracted the credentials outside of an appropriate use-case. The attackers leveraged the weakness present in the payment system of Target to access customer base and then install the malware. The attackers stole the personal information of customers including customer name, payment card details, credit card verification code etc.

RSA

AES and RSA Encryption Explained

In 2011, two groups of hackers launched a phishing attack on the employees of RS the security arm of EMC. These two groups had the support of the foreign government. This phishing attack compromised the SecureID authentication and extracted more than 40 million employee records.

These cases set a clear example of how mere negligence can destroy an entire organization.

What do reports say about such cases?

As per the report released by Kaspersky Lab, negligence of employees is

the cause of almost half of all the cyber-attacks and two-thirds of the data

Free Reports Cliparts, Download Free Reports Cliparts png images, Free ClipArts on Clipart Library breaches. 24% of the employees within the organization are not aware of the security policy that their own organization have. In the same research, 44% of the companies admitted that employees do not follow IT security policies properly. During the year 2017, 35% of organizations focused on staff training and it was the second most adopted approach to facilitate cyber security awareness.

  • An online marketing firm, Reboot, in 67% of the cyber attacks, attackers have more often targeted lower-level employees.
  • Cyber security ventures have predicted that by the year 2021, the cyber cost will cost $6 trillion globally. 42% of the large organizations and companies have accepted that they have been the victim of phishing attacks.
  • According to Symantec’s 2018 Internet Security Threat Report, 88% of all the attacks use emails with malicious attachments that have been downloaded by employees that resulted in a breach of server, device or network.
  • Watchdog says 72% of data breach attacks occur through email in organizations that have less than 100 employees.

How can organizations create cyber security awareness among employees?

Cybersecurity Awareness Training: Threats and Best Practices | Secureworks

  • These statistics are not just numbers but, have a very concerning relevance. This clearly justifies the age-old idiom of humans being the weakest link in the information security chain.
  • Organizations should focus on cyber security awareness among employees in order to prevent them against cyber-attacks.
  • Restricting access to confidential data and information can lessen the probability of the success of cyber-attack due to employee negligence.
  • Implement policies related to cyber security within the organization. It will be an add-on to the cyber security of the organization’s infrastructure.

However, one of the most effective strategies for increasing cyber security awareness is training employees. Cyber security awareness ensures that employees are ready to face cyber-attacks in real life.

Where should new security tools be deployed initially for maximum impact?

10 ways to prevent computer security threats from insiders

You have your eye on a new piece of security technology or service and you want to evaluate it before deciding whether to commit to the effort of a full deployment. Alternatively, you may already be committed to full-scale deployment but wondering where to start. So where should you deploy it first to test it most effectively and have the greatest impact?

Human nature, caution and conventional wisdom dictate that you should put it in a lab environment or in a low-importance section of your network. That is sensible, isn’t it? The change board will give you less hassle and if there is a problem, you are going to get less flack, aren’t you?

How Can CRE Industry Ensure Data Security in a Lockdown? | Wealth Management

But will that approach give you most information and practical experience about the new system’s deployment difficulties, effectiveness in your environment and what it will detect? Will it give you the maximum protection as soon as possible?

Any tool that gives you fresh insight on the behavior of your systems tends to find something interesting. Those of us who have deployed such things have the stories to go with them – from mundane discoveries such as finding that all servers in one network had the wrong DNS settings and were thus being slowed down, to critical detections of previously unobserved persistent attackers.

What Is Network Security? - Cisco

However, there is an argument to be made for deploying this new tool on your production systems, close to your crown jewels. These are the things you really want to protect and the environment in which it really needs to work. Yes, this approach is higher risk, but it is also higher benefit. Will a deployment on a low throughput, obscure bit of network really tell you much? On the other hand, couldn’t one real detection on your primary systems during the evaluation period convince you and your management of the system’s value?

Granted, this may not be a sensible suggestion for inline systems that process all traffic, but with the right technology it can work. Many security technologies monitor traffic and provide alerts rather than enforce actions — or at least they have a mode in which they can act in this way. A new security solution deployed on a span port or network tap may actually pose more risk to production traffic in terms of confidentiality than in disruption or performance. It is also easy to turn off or detach such solutions by removing the span connection. Other security tools rely on collecting logs from your existing devices. Building an architecture that allows forking and diverting the streams of log events can support easy introduction of such types of new security tooling.

What is User and Entity Behavior Analytics? A Definition of UEBA, Benefits, How It Works, and More | Digital Guardian

As an example, consider the evaluation of a new security monitoring tool, perhaps one with user and entity behaviour analytics (UEBA). Will you get much information from deploying it on a test/staging environment that will typically have a small number of users and occasional traffic? Or would you get a better sense of its value from connecting it to your production active directory, primary applications and remote access system? Wouldn’t that give you a better idea of how easily it can be connected, how well it copes with actual production loads and whether it can really differentiate between normal and suspicious behaviour?

Designing taps such as those mentioned above into your network and log architectures future-proofs your environment, making it easier to evaluate other products down the road and deploy them into final production. It can also help in emergencies, as incident response teams wishing to deploy their tooling will be looking for very similar facilities overseeing your most critical systems.

So next time you have a new security system to test, think about ignoring conventional wisdom and throwing (some) caution to the wind. Sometimes the radical step is the right one. Deploying security tools on your crown jewels first may be the optimal approach.

SQL injection attack: Your website might be undergoing one right away!

How to Prevent SQL Injection Attacks? | Indusface Blog

Injection, this word not only terrifies children but also, is a cause of immense worry for those who have suffered from ‘injection’ attacks. Last week, 90% of the deployed cyber-attacks were injection attacks. In an injection attack, attacker injects a malware or malicious code in a query or program. This allows the attacker to execute commands remotely that can read or manipulate a database. It can also enable the attacker to modify data that is lying on the website.

There are different forms of Injection attacks including XPath Injection, Blind XPath Injection, SSI Injection, OS Commanding, LDAP Injection, Format String Attack, Buffer Overflow, SQL Injection, Blind SQL Injection etc.

One of the most commonly deployed injection attacks is SQL injection. Considered as one of the top ten vulnerabilities, this injection attack is a code injection technique that targets data-driven applications by inserting malicious SQL statements into the entry field for execution. It was discovered in 1998 that is still being deployed by the attackers. SQL injection exploit security vulnerabilities in software of applications. This allows the attacker to manipulate, tamper, disclose or destroy data, changing the balances or voiding transactions etc.

What is an SQL injection attack?

Introduction to SQL Injections. SQL injection is an attack technique… | by Charithra Kariyawasam | Medium

SQL injection attack is deployed through parts of SQL statements in the web entry field for letting the website pass a freshly formed rogue SQL command to the database. It is an attack vector for websites that can be used to attack any type of SQL database.

Why are SQL injection attacks successful?

Protecting Against SQL Injection

The reason behind the success of SQL injection attacks is the weak codes. These vulnerabilities can be easily exploited by attackers for the execution of database queries thus, allowing attackers to access sensitive and confidential information, modify database entries and injecting malicious codes resulting in the compromise of the entire data. SQL injection attack can easily encrypt sensitive data. This attack can allow attackers to read information like username, passwords, card credentials. It can also allow attackers to delete the entire database.

What are the different types of SQL attacks?

SQL Injection Payload List. PayloadBox | by Ismail Tasdelen | Medium

SQL injection attacks can be categorized into four types. These are:

Blind based: In this form of SQL injection attack, attackers are not required to see any error message for running the attack. Even if the database error messages are disabled, attacker can still route the blind SQL injection attack. It can be further categorized into Boolean-based blind SQL injection attack and Time-based blind SQL injection attack.

Error based: This SQL injection attack is based on the error messages that are thrown by the database server for gathering information about the building of the database. Attackers can calculate an entire database.

Union based: In Union based SQL injection technique, attackers leverage the UNION SQL operator for combining the results of more than two SELECT statements. This attack helps in determining the structure of the main query with the help of blind SQL injection attack.

String based: This type of SQL injection attack takes place when the website is susceptible to SQL injection but does not show any consequences that would have otherwise shown after performing SQLi query.

How to prevent SQL injection attacks?

SQL Injection Prevention - A Practical Approach - Yeah Hub

Sanitization and Validation: Sanitization refers to ensure that no dangerous characters are passed to an SQL query in data. Validation confirms that the data is submitted in the form in which it is expected to be.

Updating and patching vulnerabilities: It is important apply patches and updates as soon as possible in order to prevent attackers from exploiting the vulnerabilities.

Encryption is important: Hashing or encryption of passwords as well as other crucial information including connection string is important for maintaining the confidentiality of your data.

Penetration testing: Cyber security companies like Anteelo provide managed services like web application penetration testing help in preventing SQL injection attacks with input validation testing.

SQL injection has been prevailing in the world of cyber-crime since two decades and is still strongly impacting industries. It is therefore, very important to examine each vulnerability and work in the direction to patch it.

error: Content is protected !!