After struggling for almost a year, things are finally getting back to normal. Not in the way they were before, but after being under lockdown for so long, people are adapting to this new normal.
What to make of this world driven by technology- is it a benefit or a problem for society? The truth is - both.
Honeywell released a report that over 40% of USB portable storage devices contain at least one risky file and over 25% of those threats could lead to operational issues. In 2018, IBM’s chief information security officer, Shamla Naidoo, released a statement focused on digital hygiene and IBM’s steps towards banning portable storage devices, including USBs. Similarly, the French National Assembly has worked to raise cybersecurity awareness with a similar aim to ban USB sticks during their meetings. With companies, and even countries, working to ban the use of USBs, it can be difficult for enterprises to know what decision they should make when it comes to USB policy. One way or another, enterprises need to address the issue and strictly enforce these policies to avoid catastrophic breaches. Recent security breaches and mishaps with USBs should serve as a warning to enterprises still using them freely and without restrictions.
It’s a common misconception that the only threats to an enterprise’s security come from external actors. Whether intentional or not, 47% of organizational data breaches are the result of internal human error, such as a misplaced device or document. Moreover, some employees present an even larger risk than others. According to recent reports, younger employees are more likely to bypass security protocols that are viewed as an impediment to their productivity. When it comes to onboarding new employees, young or old, enterprises must have proper security awareness & anti-phishing training, in addition to a strong privileged access management solution, to guard against the different types of human error that could create security vulnerabilities.
Mobile applications are becoming an increasingly vulnerable gateway for hackers to steal information from users and businesses alike. From accessing microphones and cameras to finding the location of a user’s device, mobile applications offer hackers access to the personal information of unsuspecting users. Recent reports have shown that over 25 million Android phones are vulnerable to attack via installed applications. As hackers become savvier, the number of mobile application attacks will continue to increase drastically. By implementing proper mobile application security and mobile application vulnerability testing procedures, enterprises can remain safe even as attacks rise.
Knowing an enterprise’s weaknesses is just as important as knowing its strengths. Penetration testing is the process of auditing a computer system, network or web application to uncover security vulnerabilities a hacker could exploit. The penetration testing process, which can be automated and/or manual, is a way to give enterprises valuable information on how to tighten their security measures.
Every year, as the cybersecurity requirements of businesses become more complex, technology continues to evolve beyond them. Although new Internet of Things (IoT) devices and cloud-based systems are helping companies run more efficiently, they can also pose significant cybersecurity risks. Earlier this year, the RevBits team published an article covering some of the biggest malware and ransomware attacks from 2020 and what enterprises could expect in 2020. Read more to discover the state of both malware and ransomware so far in 2020.
Enterprise risk of cyber attack has increased due to improper password and key management protocols. Businesses around the world lose an estimated $2.9 million to cybercrime every minute because of ineffective password management practices. Enterprises could spend countless amounts of money on cybersecurity to encrypt data and put up firewalls, but without a strong password manager technology, none of that matters. Password managers ensure that every employee in an enterprise can keep data secure.
Cybersecurity companies constantly work to outmatch the latest security threats by implementing new features to various cyber technologies. Companies update their privileged access management solutions, for example, to better catch and contain malicious actors. Some privileged access management tools, however, are difficult to use and, as a result, are ignored by employees. To provide enterprises with the most useful and up-to-date technologies, security companies must ensure that privileged access management solutions are easy to deploy, simple to use and efficient to maintain. Video recording is also a must to ensure a privileged access management solution is complete. Here are a couple of reasons video recording is a necessary next step for privileged access management software.