Security Awareness training is essential for companies but can be a daunting task.
Recently the new General data protection regulation (GDPR) took effect in Europe. Compliance is necessary for all companies and this new regulation makes it mandatory for many companies to assign a dedicated Data Protection Officer (DPO) to handle their data security affairs.
There are a lot of things to consider with regards to GDPR, security awareness training for your employees being one of the most crucial things. That's where we can help.
It is crucial that all your people are aware of the cyber security threats out there.
To give you an idea of what kinds of things your organisation is dealing with, here is my Top 10 list of Security Awareness Topics - the kinds of things everyone in your organisation needs to be aware of today!
1. DATALEAKS
Everyone makes mistakes.
Security awareness training guides employees on how to react to and report a leak.
It can be hard and embarrassing to admit mistakes. Creating an environment that encourages employees to report mistakes and possible leaks is very important (even if it was an accident or not their responsibility).
Duration matters when it comes to data leaks. The longer a bucket of personal or sensitive information stays open the more significant the threat of the leak.
Failure to report a leak can have severe consequences for the individual and lead to hefty fines for the company.
2. SOCIAL ENGINEERING
After a few drinks, the sharing can go overboard, and sensitive information may be discussed and shared.
The intention of the sharing was not bad. You might not realize the serious consequences it can have if the other person is dishonest and shares classified information with someone else.
It is essential never to discuss confidential work issues with unauthorized people, even if you trust them.
3. PHISHING
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity.
The word "Phishing" is a newly coined expression created as a homophone of fishing due to the similarity of using bait in an attempt to catch a victim.
Phishing is typically carried out by email spoofing or instant messaging. It often directs users to enter personal information at a fake website which looks and feels identical to the legitimate one - the only difference may be the URL of the website in concern.
4. TAILGATING
If you remember correctly, John was pretty angry when he got laid off two months ago. What you might not realize is that John, who knows his way around the company, is about to steal some sensitive information as an act of revenge.
Tailgating threats used to be related to thieves stealing physical things by following an authorized person into a secure location. However, in today's digital society tailgating is often combined with stealing sensitive information which can lead to serious financial consequences for companies.
The threat is usually associated with former employees, thieves, vandals or people that have issues with the company or employees.
5. PASSWORDS
"Ughhh..." you may think, "it's that time again!" You need to come up with a password that you can easily remember, and it is harder and harder to come up with something innovative.
Passwords are crucial to protect your workstation. To create a secure password it is best to use a combination of lowercase, uppercase, symbols, and numbers.
It can make your life easier to come up with a sentence and use one letter from every word.
6. CEOSCAM
He claims to be in a hurry and needs you to transfer money to his account quickly.
You quickly transfer the money... But then you notice something strange; his email address is not even from your company.
This scam is a type of phishing, where cyber criminals spoof company email accounts and try to fool an employee, especially in accounting or HR.
Always double check unusual requests from your boss, especially regarding a financial transfer.
7. RANSOMWARE
Ransomware is a malware or a virus that encrypts the data on your computer or in some cases your whole network. After that, you cannot access your files or pictures, until you pay the ransom, and in some cases not even then.
The most common delivery mechanism of ransomware is by using a phishing scam, attachments sent via email, masquerading as a file you should trust. After they are downloaded and opened, they can take over your computer.
In some cases, ransomware is delivered to your computer via compromised websites which you think you can trust.
If you get infected, there is a small chance you may be able to recover. Check out this site for instructions: https://www.nomoreransom.org/en/index.html
Best practices to guard against ransomware:
8. PRINTOUTS
It is important to properly dispose of your unused documents, failed prints and not to leave them in the printer tray unsupervised for an extended period.
Information in these documents can be worth a lot of money to the wrong people.
9. DUMPSTERDIVING
10. WIFI AT HOME & OPEN WIFI
A router is usually just a small computer with its own operating systems, software and vulnerabilities.
Often routers advertise their type and make directly in the Wireless name (SSID) making it easier for hackers to see which type the router is. This may even make it easier for them to get information about how to hack it.
Changing the router SSID and the admin username and password is the first step in securing a home WiFi. Updating a router's firmware is something that should be done on a regular basis.
Most routers fail in notifying users that an update is available even though those updates are essential to patch security holes.
It can also be necessary to restart the router every once in a while.
A stolen mobile device is also a risk to both home and office WiFi as the device has direct access to the networks it is connected to. Remotely wiping a stolen device is something that should be done as soon as possible.
Using free public WiFi networks comes with a number of security risks, but an overwhelming majority of people use it without hesitation. The same features that make them desirable for consumers make them desirable for hackers.
The most common threat to public WiFi is the possibility for the hacker to position himself between you and the connection point, making all your traffic go directly through the hacker's computer. That wayit is easy for them to catch passwords or data that is not encrypted.
Hackers can also use public WiFi to distribute malware. If you allow file sharing on your computer, it is quite easy for a hacker to plant infected software on your computer.