Page 42 - Cyber Warnings
P. 42







Don t Become Another Data Breach Statistic


7 tips from a security expert to implement now

by Lee David Painter, CEO, Hypersocket Software


Hardly a week goes by without a new data breach grabbing the headlines. Already this year,
data breaches at mobile phone network Three, Wonga and Sports Direct have come to light.
Not to mention the ransomware attack on the NHS and other organisations.

It’s tempting to believe that all attacks and breaches are as a result of shady hackers operating
from half way around the world – and that large organisations are always the targets.

However, in many cases, the cause of a data breach is much closer to home and as often down
to poor password security, software vulnerabilities, simple human error, and abuse of access
and privileges, as malicious outsiders. And there’s growing evidence that smaller businesses
are being impacted too.

Network security specialists, Hypersocket Software counts organisations such as Cisco, Xerox
and Huawei among its customers.

As more and more organisations look to tackle their everyday security challenges, we offer
seven steps to help smaller businesses avoid becoming a data breach statistic.

1. Introduce IAM - Stolen credentials are a prime entry point to systems for hackers.
Investing in fairly simple Identity and Access Management (IAM) technology means a
business can be sure that regardless of how a network and data is being accessed, it’s
being accessed securely.


2. Use multi-factor authentication - One of the best practices for securing data is
extending security around applications by using multi-factor authentication.

That means to gain access to a system a user is authenticated by providing information
on something they know and something they have.

So, the first authentication challenge might be provide a piece of personal information,
such as their favourite football team or favourite colour (something they know). The
second challenge could be a time limited token sent to their mobile with a reactivation
code (something they have).

Multi-factor authentication should particularly be used for granting access to privileged
users.
42 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   37   38   39   40   41   42   43   44   45   46   47