How to Avoid the Most Common Causes of Cybersecurity Incidents

Cybercrime is at an all-time high. Although cyber liability insurance policies exist to help cover potential losses resulting from cybersecurity incidents, it is better to take measures to ensure these events do not occur in the first place.

3 Key Cybersecurity Measures
Protect your accounts

  • Make sure your password is secure. The longer it is or the more complex it is, the harder it is to guess.
  • Don’t share your password with people or other places. If you use your password on multiple sites and one of them is breached, it will be the first password a threat actor would use to attempt to get into your account.
  • When applicable, use another form of authentication to supplement your password. “Multi-Factor Authentication (MFA)” is a common form of additional protection available via an app on your phone, an SMS (text message), a call with a recorded number, or a digital token.

Be vigilant of emails in your inbox

  • Most cyber events are a result of either poor configuration (weak passwords, insecure protocols and applications, remote access software) or a matter of social engineering where a threat actor attempts to get you to take action, following their request, that provides them direct access or compromises your account, computer, or network.
    • Common methods of identifying a “phishing” email include:
      • Spelling or grammar issues
      • A change in the user’s email address
      • Non-functional or unexpected attachments or hyperlinks
      • A sudden call to action, or sense of urgency
      • Making requests that may not pertain to you or may be outside of your normal daily duties

Exercise an appropriate level of suspicion regarding unexpected links or attachments.

Be aware of your surroundings

  • Not every cyber breach involves a cyber-attack, and in many cases passwords or compromising information can be obtained from physically entering the premises or looking through discarded paper.
    • Consider shredding any documents leaving your place of work or home
    • Don’t allow unconfirmed individuals access to your premises.
    • A threat actor may also take advantage of human nature.
    • Observe a clean desk policy as this helps encourage good password hygiene
    • Do not plug in unexpected removable media (flash drives, CDs, DVDs, etc.) as these may contain malicious software

Conclusion

Taking measures to prevent cybersecurity breaches can help greatly reduce the chances of a business succumbing to related losses and interruption. In the case that a breach has already occurred, it is advisable to seek the help of digital forensics experts as early as possible

Summarized from www.statetechmagazine.com

Leave a Reply