- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
The topic of IT security is often difficult to access for users without a technical background. However, it doesn't take too much to better secure your own IT systems against cybercriminals. That is why you will find 5 basic tips for more IT security that employees can implement! Include antivirus in your security strategy.
IT Security - People &
Technology
If you are looking for a definition for IT security, Duden
will help as follows: IT security describes the "security in the field of
information technology". To put it more simply, it concerns all technical
and organizational measures that are needed to protect servers, computers, cell
phones, and the like from cybercriminals. Not only the technical security
plays a role here, but also the person who interacts with the technology. Because
what is often not known: Cybercriminals resort to well-known means from the
"real" world - manipulation,
illegal intrusion and theft are the order of the day.
The Human Factor - Why Is the
Human Being so Important for IT Security?
Technical protective measures, such as a good firewall, are
essential. For cybercriminals, however, it is usually easier to use
humans to enforce criminal intentions. Did you
know that 9 out of 10 cyber attacks start on humans? Hackers
try to gain access to the company through their victims - mostly to
obtain secret or sensitive data. These are then sold afterward or the
hackers use them to extort ransom themselves. Such a procedure is based on
the principle of social engineering, i.e. on influencing and
exploiting people to make them behave in certain ways.
In order
for the hackers to achieve this goal, the emotions of the victim are
deliberately exploited, for example, fear, curiosity, or pressure. Not only
are the psychological tricks varied, but the points of attack also vary. Dr. Niklas
Hellemann, Managing Director of SoSafe, assesses the situation as follows: “The
hackers keep finding new points of attack, be it through passwords, phishing
emails, or social media. After the outbreak of the pandemic, ENISA was able
to detect a 600% increase in phishing emails between February and
March alone - also with a content-related reference to the coronavirus. Holistic
training of employees in these user-centered cyber attacks is therefore
essential. "
1. Passwords - This Is How It Works
One of the most basic measures against hacking attacks is the
use of strong passwords. A loss of control over
passwords can have far-reaching consequences - personal financial damage,
damage to the company, and identity fraud. Strong passwords should be used
to minimize the risk. Passwords are best randomly based and contain a wide
variety of different characters. Thinking about them and remembering them
can be very difficult. It is therefore advisable to use a password manager
that helps you create and manage.
2. Emails - Identify Suspiciously
Signs
Many employees receive a flood of messages in their e-mails
every day: from brief information from colleagues to newsletters and system notifications. No wonder that phishing emails are the hackers' favorite
medium - fraudulent intentions can easily be hidden in a large number of
messages. In any case, it is important to check the legitimacy of the email about certain characteristics: Irregularities in the sender,
links, and file attachments can indicate phishing.
3. Clean Desk - Analog Measures
Are Also Important
When leaving the workplace, the computer should be locked with a
password. Also, no important data should be openly visible on the desk -
these are best placed in a locked cupboard. In the case of very sensitive
documents, it is not enough to throw them in the trash - special precautions
must be taken here. Shredding the documents before they are thrown away is
therefore essential.
4. Social Media - Data for
Everyone: A Feast for Hackers
Hackers use private information from social media - also for
attacks in a professional context, in the form of targeted spear-phishing
attacks. Many employees are not aware of this particularly perfidious
scam. It is advisable to be very conscious about who will share which
information with whom. You should also carefully check which friend
requests are accepted. Messages referring to login pages are also often an
indication of a phishing attempt.
5. Security Incident -
Intervene Quickly and Courageously
Despite the precautions, you are not sure whether an IT security incident has occurred? Possible signs include a slow computer after an installation, but also an unknown error message after clicking on a link. If in doubt, it is better to react too much. Specifically, this means staying calm, disconnecting the computer from the network, and contacting the responsible IT department. Time is of the essence in security incidents, so a quick and courageous response is important.
Include Protegent360's antivirus to prevent hackers.
- Get link
- X
- Other Apps
Comments
Post a Comment