Page 44 - Cyber Defense eMagazine December 2022 Edition
P. 44

businesses worldwide. Smishing is a form of ‘phishing’ using SMS or text messages instead of emails to
            entice recipients to click on fake links which downloads malware onto their device.

            On  their  own  devices,  users  cannot  be  prevented  from  surfing  the  web,  utilising  social  media,  or
            accessing personal email. How can you assist them in performing these routine duties in a safer manner?
            Request that all staff read basic instructions and/or participate in training that covers common malware
            attack strategies.


            Employers should also teach users to double-check URLs in emails to ensure they are accurate, relevant,
            and trustworthy. Also, think about deploying email security solutions that can help prevent malware and
            phishing attacks from reaching employees’ inboxes. It makes no difference if you have the world’s most
            secure security system. It only takes one inexperienced employee to be deceived by a phishing attempt
            and hand up the information you’ve worked so hard to safeguard. Make sure you and your staff are both
            aware of these specific email phishing examples, as well as all of the warning indicators of a phishing
            attempt.




               4.  Back everything up regularly

            What if your organisation already has a backup system in place? First and foremost, kudos on a job well
            done; but, the task does not end there. It’s critical to test your backup recovery process on a frequent
            basis. It’s pointless to back up data if you can’t recover it. You’ll know if your backup procedure is working
            properly if you run that test on a frequent basis. It’s not uncommon for a backup drive to run out of disc
            space for no one to notice.


            Performing  a  proper  backup  can  be  a  challenging  task.  Therefore,  backups  should  be  included  in
            your business  continuity  plan.  A  business  continuity  plan,  according  to Travelers  Insurance,  is  “a
            proactive plan to avoid and manage risks associated with a disruption of operations.”

            It  outlines  the  measures  that  must  be  performed  before,  during,  and  after  an  event  in  order  for  an
            organisation’s financial viability to be maintained. That implies that if your business systems are affected,
            whether by a fire or flood in the office or, more recently, a cyber attack, you’ll have a plan in place to
            minimise  the  impact  on  business  performance.  Backing  up  your  company’s  data  could  mean the
            difference between surviving a cyber attack and going out of business.




               5.  Manage all organisational devices

            Security  concerns  are  growing  as  the  Bring  Your  Own  Device (BYOD) trend  rises  and  the  use  of
            Software-as-a-Service (SaaS)  applications  spreads.  Organisations  can  begin  with  user  education  on
            devices is a simple but crucial step in securing them. It guarantees that every employee in your company
            is informed of the best procedures for safeguarding your data. While it starts with onboarding, teaching
            your staff how to safeguard their devices is a continuous activity.




            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         44
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   39   40   41   42   43   44   45   46   47   48   49