Page 37 - Cyber Warnings
P. 37
● Failed login attempts from alphabetically sequential usernames or passwords.
● Logins with a referring URL of someone's mail or IRC client.
And if you’re unable to afford multi-million dollar IT systems personnel with the bandwidth to
monitor your data security 24/7 for these signs, then adding automation to the process can
provide an efficient boost to your threat identification capability using the latest technology.
5. Inadequate mobile device security measures for employees
Mobile devices are regularly used outside your organization - and outside your data security
firewall and spam prevention tools, too.
With mobile access, your network security has limited control...
...unless you apply the following mobile device security best practices:
1. Install anti-malware software.
2. Use an encrypted VPN.
3. Use multiple forms of authentication such as built-in biometrics in addition to pincode
protection.
4. Block the use of third-party software.
5. Direct mobile traffic through special gateways with customized firewalls and security
controls.
6. Avoid unsecured wireless networks and hide Bluetooth.
These corporate data security threats are more common than you think and if corporations who
invest millions of dollars into network security can fall victim to hacking, then so can you.
Will you be prepared?
Ensure that your IT personnel are trained on appropriate security measures and are armed with
the tools they need to prevent cyber crime spreading, like automation, to help them do their jobs
more effectively.
About The Author
My name is Arman Sadeghi, founder & CEO of All Green Recycling. He
founded All Green Recycling in 2008 after watching a “60 Minutes”
expose on the current state of electronics recycling in the United States
and the lack of focus on Data Security and Environmental Stewardship.
He is a serial entrepreneur who currently owns and operates companies
in various industries including IT, Data Security, Business Consulting,
Marketing, Photography and more. Arman can be reached online at (EMAIL:
[email protected], Twitter: https://twitter.com/AllGreen_ITAD, FACEBOOK:
https://www.facebook.com/allgreenrecycling, LinkedIn: https://www.linkedin.com/company/-all-
green?trk=biz-companies-cym, YOUTUBE: https://www.youtube.com/user/AllGreenRecycling)
and at our company website https://www.allgreenrecycling.com/
37 Cyber Warnings E-Magazine – July 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide