Cybersecurity has become a top priority for all organizations today when it comes to keeping their information safe from theft, damage, and disruptions. First, however, organizations must be up to date to have the best cybersecurity, using best practices and procedures to prevent hackers from succeeding.
Discover how the enemy works and how you can defend your organization with the following presentation, A Look Into Cyber Security:
A Look Into Cyber Security from GTreasury
Network security in cyberspace is never far from the headlines. Unfortunately, it’s never good news when it does reach the headlines. Here are just a few famous – or infamous – security breaches of the not-too-distant past, even though they might seem like ancient history by now: Target, Adobe, TJX, Home Depot, Sony Playstation, Heartland, Epsilon. Unfortunately, hackers and cyber thieves are good at what they do and getting more sophisticated all the time. They take advantage of gaps and weak spots in information technology systems. But those gaps and weak spots are almost exclusively because some human beings weren’t doing their job properly. We can continuously improve our hardware and software, and we’ll discuss a few ways we’re doing that. But it doesn’t matter how powerful or expensive your system is if you don’t know how to use it.
HOW THE ENEMY WORKS
Spam. Spear phishing. Social engineering. Confederates inside the target institutions. Black-hat tool kits are more advanced than developers’ tools when building applications. They’re all part of the arsenal that hackers use. Nowadays, we don’t hear much from the deposed African prince who wants to split a hundred million bucks with us. Cybercrime has gone way beyond such stickups of unwary individuals. The cybercriminals are working full time and studying your business. They scan for the open port, look for SSL vulnerabilities, do automated testing. They seek out the one vulnerable machine on the network or the gullible or inattentive person who clicks on a link and lets malware in. They also learn who does your payroll, whether you use FedEx who’s your ISP. They’ll send you an invoice that says your account is overdue, and you’ll be terminated if you don’t reply. People click on the invoice link, which can look like a pdf file but which masks an executable one, without thinking. Even high-credentialed employees like executives, CFOs, and treasurers get duped. They’re in a hurry, and they click on links without thinking.