Page 29 - Cyber Warnings
P. 29







4. End-user education is a key line of defense. Employee education and training needs to
be ongoing, hackers are always looking for new ways to attack but will also rely on tried and
true attack methods. Employees need be kept up to date on how to spot a malicious email, be
able to decipher when not to open an attachment, and understand that erring on the side of
caution is good. Scammers are becoming more complex with their attacks, creating elaborate
and frighteningly on-point digital profiles for targeted attacks, many of which are successful.
Employees need to be equipped with the proper education to combat these new attacks and
report suspicious activity.

5. “You can’t be too Careful” Employee need to know the importance of every threat and
trust the members of the security team. If someone thinks they might have downloaded a
malicious document, they should immediately reach out to the security team. Even if they are
incorrect and the email is not suspicious, employees need to be in the habit of quickly alerting
the security team. Employees should know there’s no embarrassment in a false positive, but the
effects of a breach can hurt them along with the company.

Hackers are always finding new ways to infiltrate networks, the more time dedicated to new and
notable threats, the better off your organization will be. And with just these five steps, your
organization will be able to optimize analyst’s time immediately. For analysts, without the need
to examine a surplus of avoidable alerts, they will be able to focus their efforts on the threats at
hand.



About The Author


Steven Rogers, is the Founder and CEO of Centripetal Networks.
Steven Rogers has more than 30 years of technology leadership
experience. During his career he founded and served as CEO of
five network product companies. Steven began his career in the
USAF in the Air Force Security Group, where he worked on
encryption and new secure communications systems for the
AWACS, the National Military Command Center, various space-
based systems for the NRO, and Air Force One. Steven holds a
Bachelor of Science degree in Electrical Engineering from Virginia
Tech and has over 10 US Patents.

Steven can be reached at ([email protected]) and through the company website
http://www.centripetalnetworks.com/index.php







29 Cyber Warnings E-Magazine – June 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   24   25   26   27   28   29   30   31   32   33   34