PlatoAiStream

PlatoAiStream

  • About
  • OpenAi
  • DefiX
  • Features
  • Connect
  • Login
  • Register
PlatoAiStream

PlatoAiStream

  • Plato Verticals
  • Plato AiStreams
    • Arabic
    • Chinese
    • Dutch
    • English
    • Finnish
    • French
    • German
    • Greek
    • Hebrew
    • Hindi
    • Indonesian
    • Italian
    • Japanese
    • Korean
    • Norwegian
    • Polish
    • Portuguese
    • Russian
    • Spanish
    • Swedish
    • Thai
    • Turkish
    • Ukrainian
    • Vietnamese
  • Publications
    • Web3Africa
  • DefiX Gateway
    • Bitcoin ATMs
    • Blockchain Events
    • Compliance
    • DAO’s
    • Dapps
    • Developers
    • DEX’s
    • Exchanges
    • Gaming
    • Insurance
    • Launchpads
    • Lending
    • Marketplaces
    • Mining
    • NFTs
    • Payments
    • Resources
    • Social
    • Stablecoins
    • Staking
    • SupplyChain
    • Trading Gateway
    • Venture Capital
      • Yeoman’s Capital
    • Wallets
  • Market Data
    • Nasdaq 100
  • Analytics
  • W3 Metaverse
  • Protocol Registry
    • Algorand
    • Avalanche
    • BNB Chain
      • Bee’n’Bee
    • Cardano
      • CatKinson
    • Cosmos
    • Dfinity
    • Elrond
    • EoS
      • Log out
    • Hedera
    • IoTex
    • Polygon
    • Ripple
    • Solana
    • Stellar
    • Tezos
    • Tron
    • XDC
      • DATACHAIN
  • Zephyrnet
  • Terms of Use
  • Privacy Policy
  • Cookies Policy
  • DMCA Notice
  • GDPR
Cybercrime Doesn't Take a Vacation
Dark reading

Cybercrime Doesn’t Take a Vacation

Cyber SecurityTime Stamp: June 16, 2023 10:00 AM
Source Node: 2139172
Republished By Plato

Republished By Plato

Followers: 0

Summer is just around the corner, and every cybersecurity professional I know is braced for cybercriminals to take action. The Cybersecurity ad Infrastructure Security Agency (CISA), part of the Department of Homeland Security, warns that holidays are a period of heightened threat. That can be extrapolated to any time cybercriminals think IT security teams might be lean or preoccupied, such as the summer season, when workers typically take more time off and stay out of the office for longer.

Here are four top considerations to help IT security staff manage risks — even when they’re short staffed with holidays and vacation schedules.

1. Beware of Taking Work and Hardware on Vacation

From the malicious intentions of a thief to a well-intentioned passerby going through a device to reach its owner and seeing sensitive information, lost hardware can evolve from an inconvenience to a corporate reputation and compliance nightmare.

To avoid the risk of lost hardware, it’s best practice for employees to leave company devices at home unless they need to work while traveling — especially when it comes to international travel. As a precaution in the event devices are lost or stolen, employees should keep any devices with company information locked. IT departments should mandate phishing-resistant multifactor authentication, require employees to change passwords at least every six months, implement stringent password requirements, or explore passwordless validation options.

2. Avoid Open Wi-fi and Public USB Ports

While many employees are aware of the risks associated with using public Wi-Fi and charging ports, the convenience of sending a quick email from the airport or using public power outlets may be difficult to resist. It’s essential to remain vigilant, because of the dangers of sneaky threat actors tapping into shared networks and infiltrating personal devices or corporate systems.

According to one survey, 40% of respondents had their information compromised while using public Wi-Fi. The Federal Communications Commission warns about “juice jacking,” in which bad actors target travelers running low on battery power and load malware onto public USB charging stations to hack into electronic devices.

Work travel and quick check-ins while in transit make it difficult to completely avoid working in public. To avoid the security, compliance, and reputation risk of a hack, instruct employees on secure mobile working practices. Employees should use known, secure hotspots instead of connecting to public Wi-Fi. If Wi-Fi can’t be avoided, they should use a virtual private network (VPN). Employees looking for a charge while on the go should only plug their chargers into AC power outlets, rather than public USB ports. This goes for company devices and personal devices that have access to company email or messaging applications, even if their primary use isn’t for work.

3. Focus Security Training and Messaging About Holiday Cyber-Risks

Many cyberattacks like ransomware happen on Friday afternoons, and if it’s a holiday weekend, the risk is high. Threat actors rightly calculate that a distracted employee trying to wrap up their work week might inadvertently click a phishing link or a security team might be running with a skeleton crew because of vacation schedules. Due to this, organizations must especially fortify their defense posture and check crisis management/business continuity plans as we approach holiday weekends.

Companies should closely monitor networks and systems for suspicious activity by combining employee and AI-led strategies in order to maximize time and cost efficiency, allowing AI monitoring and data protection to fill in the gaps when IT teams are spread thin.

Security departments should also schedule security refresh trainings ahead of summer vacation season. Schedule thoughtfully to ensure employees have dedicated time to review security practices and absorb the information.

4. Now Is the Time for IT Security Teams to Mobilize

It’s necessary to develop plans to accomplish the preceding three steps and also ensure business can continue when an attack inevitably does occur. A business continuity plan will help you react appropriately and expeditiously in the event of an attack, thereby limiting the effects and scope of the crisis. Plans should include:

  • An outline of who needs to be involved and their responsibilities, with contingencies in place that account for staff vacation plans
  • Detection and initial analysis of the attack
  • Defining the scope of the attack
  • Determining the origination of the attack (who/what/where/when)
  • Determining if the attack has concluded or is ongoing
  • Determining how the attack occurred
  • Containing the impact and propagation of the attack
  • Eradicating the malware and vulnerabilities that may have permitted its ingress and propagation
  • Recovering data from hardened backups
  • Responding to regulatory and/or contractual obligations as a result of the breach

Bad Actors Come Prepared, but So Can Companies

Good security people prepare well. Relationships, training, awareness, technologies and incident response playbooks all help to manage and reduce risk. While long weekends and other time off are rarely true holidays for security professionals, there are steps we can take to prepare and protect our organizations, so employees can remain vigilant while also enjoying well-deserved time off.

  • SEO Powered Content & PR Distribution. Get Amplified Today.
  • EVM Finance. Unified Interface for Decentralized Finance. Access Here.
  • Quantum Media Group. IR/PR Amplified. Access Here.
  • PlatoAiStream. Web3 Data Intelligence. Knowledge Amplified. Access Here.
  • Source: https://www.darkreading.com/vulnerabilities-threats/cybercrime-doesnt-take-a-vacation

Time Stamp: June 16, 2023

  • :has
  • :is
  • $UP
  • a
  • About
  • AC
  • access
  • accomplish
  • Account
  • Action
  • activity
  • actors
  • Ad
  • agency
  • ahead
  • AI
  • airport
  • All
  • Allowing
  • also
  • an
  • analysis
  • and
  • any
  • applications
  • approach
  • appropriately
  • ARE
  • around
  • AS
  • associated
  • At
  • attack
  • Authentication
  • avoid
  • avoided
  • aware
  • awareness
  • battery
  • BE
  • because
  • BEST
  • Beware
  • business
  • business continuity
  • but
  • by
  • calculate
  • CAN
  • change
  • charge
  • charging
  • charging stations
  • check
  • CISA
  • click
  • closely
  • combining
  • come
  • comes
  • commission
  • Communications
  • company
  • completely
  • compliance
  • Compromised
  • concluded
  • Connecting
  • considerations
  • continue
  • contractual
  • convenience
  • Corner
  • Corporate
  • Cost
  • crisis
  • cyberattacks
  • cybercrime
  • cybercriminals
  • Cybersecurity
  • dangers
  • data
  • data protection
  • dedicated
  • Defense
  • Department
  • department of homeland security
  • departments
  • develop
  • device
  • Devices
  • difficult
  • does
  • doesn
  • due
  • effects
  • efficiency
  • Electronic
  • email
  • Employee
  • employees
  • ensure
  • especially
  • essential
  • Ether (ETH)
  • Even
  • Event
  • Every
  • evolve
  • explore
  • FCC
  • Federal
  • Federal Communications Commission
  • fill
  • Focus
  • For
  • Forbes
  • four
  • Friday
  • from
  • gaps
  • Go
  • Goes
  • going
  • hack
  • had
  • happen
  • Hardware
  • Have
  • heightened
  • help
  • High
  • Holiday
  • holidays
  • Home
  • homeland
  • Homeland Security
  • How
  • HTTPS
  • i
  • if
  • Impact
  • implement
  • in
  • incident
  • incident response
  • include
  • inevitably
  • information
  • Infrastructure
  • initial
  • instead
  • intentions
  • International
  • into
  • involved
  • isn
  • IT
  • it security
  • ITS
  • jpg
  • just
  • Keep
  • Know
  • known
  • least
  • Leave
  • like
  • limiting
  • LINK
  • load
  • locked
  • Long
  • longer
  • looking
  • lost
  • Low
  • make
  • malware
  • manage
  • mandate
  • many
  • Maximize
  • May..
  • messaging
  • might
  • Mobile
  • Monitor
  • monitoring
  • months
  • more
  • multifactor authentication
  • must
  • namely
  • necessary
  • Need
  • needs
  • network
  • networks
  • now
  • obligations
  • occur
  • of
  • off
  • Office
  • on
  • ONE
  • only
  • open
  • Options
  • or
  • order
  • organizations
  • origination
  • Other
  • our
  • out
  • Outlets
  • outline
  • owner
  • part
  • Password
  • Passwords
  • People
  • period
  • personal
  • phishing
  • Place
  • plan
  • plans
  • plato
  • Plato Data Intelligence
  • PlatoData
  • plug
  • ports
  • power
  • practice
  • practices
  • Prepare
  • prepared
  • primary
  • private
  • professional
  • professionals
  • propagation
  • protect
  • protection
  • public
  • Quick
  • ransomware
  • rather
  • RE
  • reach
  • React
  • reduce
  • regulatory
  • Relationships
  • remain
  • reputation
  • require
  • Requirements
  • respondents
  • response
  • responsibilities
  • result
  • review
  • Risk
  • risks
  • running
  • s
  • schedule
  • scope
  • Season
  • secure
  • security
  • seeing
  • sending
  • sensitive
  • shared
  • Short
  • should
  • SIX
  • Six months
  • Sneaky
  • So
  • spread
  • Staff
  • Stations
  • stay
  • Steps
  • stolen
  • strategies
  • such
  • summer
  • Survey
  • suspicious
  • Systems
  • Take
  • taking
  • Target
  • team
  • teams
  • Technologies
  • than
  • that
  • The
  • the information
  • the security
  • their
  • There.
  • thereby
  • they
  • Think
  • this
  • threat
  • threat actors
  • three
  • Through
  • time
  • to
  • top
  • Training
  • trainings
  • transit
  • travel
  • travelers
  • Traveling
  • true
  • typically
  • usb
  • use
  • using
  • vacation
  • validation
  • Virtual
  • VPN
  • Vulnerabilities
  • Warns
  • we
  • week
  • weekend
  • WELL
  • when
  • which
  • while
  • WHO
  • Wi-fi
  • will
  • with
  • Work
  • working
  • wrap
  • you
  • zephyrnet

More from Dark reading

Recast Software Acquires Liquit, Consolidating the Endpoint and Application Management Markets

Recast Software Acquires Liquit, Consolidating the Endpoint and Application Management Markets

Source Cluster:
Dark reading
Source Node: 2286725
Time Stamp: Sep 22, 2023

Worried About the Exchange Zero-Day? Here’s What to Do

Source Cluster:
Dark reading
Source Node: 1710369
Time Stamp: Sep 30, 2022
LockBit Leaks Documents Filched From UK Defense Contractor

LockBit Leaks Documents Filched From UK Defense Contractor

Source Cluster:
Dark reading
Source Node: 2254988
Time Stamp: Sep 5, 2023
Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks

Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks

Source Cluster:
Dark reading
Source Node: 2058187
Time Stamp: Apr 14, 2023
Azure AD 'Log in With Microsoft' Authentication Bypass Affects Thousands

Azure AD ‘Log in With Microsoft’ Authentication Bypass Affects Thousands

Source Cluster:
Dark reading
Source Node: 2143397
Time Stamp: Jun 22, 2023
How Cybercriminals Are Operationalizing Money Laundering and What to Do About It

How Cybercriminals Are Operationalizing Money Laundering and What to Do About It

Source Cluster:
Dark reading
Source Node: 1941752
Time Stamp: Feb 6, 2023
Global Security Assurance Market to Reach $13B by 2030

Global Security Assurance Market to Reach $13B by 2030

Source Cluster:
Dark reading
Source Node: 2183531
Time Stamp: Jul 24, 2023
Qwiet AI Builds a Neural Net to Catch Coding Vulnerabilities

Qwiet AI Builds a Neural Net to Catch Coding Vulnerabilities

Source Cluster:
Dark reading
Source Node: 2070666
Time Stamp: Apr 24, 2023

Niels Provos Joins Lacework as Head of Security Efficacy

Source Cluster:
Dark reading
Source Node: 1771473
Time Stamp: Dec 13, 2022
Keep Your Friends Close and Your Identity Closer

Keep Your Friends Close and Your Identity Closer

Source Cluster:
Dark reading
Source Node: 2102620
Time Stamp: May 19, 2023

One Identity Acquires OneLogin to Boost Identity Security Portfolio

Source Cluster:
Dark reading
Source Node: 1877147
Time Stamp: Oct 4, 2021

Malicious npm Packages Scarf Up Discord Tokens, Credit Card Info

Source Cluster:
Dark reading
Source Node: 1598694
Time Stamp: Jul 29, 2022

About Us

  • Open Intelligence
  • Culture
  • Data Ecosystem
  • W3 Disruption
  • Team

Vertical Search & Ai

  • The Evolution of Search
  • What is Vertical Search
  • What is Vertical Intelligence
  • Ai Data Defragmentation
  • Data As A Service (DaaS)

Platform

  • Platform Features
  • Plato Analytics Reporting
  • PlatoAi NLP Engine
  • Sectors / Verticals
  • How Plato Works

Stay Connected

  • Governance
  • Register
  • Live Chat
  • Connect
  • Social

Account

  • Register
  • Packages
  • Enterprise
  • Listing
  • Partnerships
null
null

Copyright @ 2022 Plato Technologies Inc