Did you know that human error was a contributing factor in 95% of breaches? Since human error plays such a vast role in cyber breaches, addressing it is key to reducing the chances of your business being successfully targeted. It also allows you to protect your business from a far wider range of threats than any single technical solution could and can potentially empower your workforce to actively look out for and report new threats they may encounter. Mitigation of human error must be key to business cybersecurity in 2021.
Most employees have sat in on manual handling courses, first-aid training, safe pass, health & safety meetings but few have ever participated in cyber training. If the inbox is the biggest threat to the business, then the casual nature of how it is used by staff must change
2 Factor Authentication or 2FA is a security measure that requires you to provide two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online services. By implementing 2FA you are telling the online service that you are in fact, who you claim to be.
Email is the No.1 threat vector and most cyber-attacks including ransomware occur because of an action carried out by the recipient of an email. So, do you trust your inbox? The following tips are designed to help you investigate an email and avoid falling victim to a ransomware or other cyber-attack.
Share on facebook Share on twitter Share on linkedin Brute Force Ransomware Attacks are on the Increase: A Strong Password Policy is your Best Defence Recent research by leading cybersecurity firms such as SonicWall, McAfee and F-Secure has found that brute force attacks are now the preferred means of spreading ransomware however, phishing emails remain
Essential Cybersecurity Toolkit
In the final part in this series on cybercrime, I will highlight some other forms of cybercrime that you should be aware of and that have the potential to negatively impact your business operations. I will then finish off by summarising what has been covered throughout the series in a section titled "lessons learned" Other