{"id":27240,"date":"2020-05-11T08:57:21","date_gmt":"2020-05-11T08:57:21","guid":{"rendered":"https:\/\/sysprove.com\/ar\/?p=27240"},"modified":"2020-06-30T10:27:54","modified_gmt":"2020-06-30T10:27:54","slug":"the-need-for-cyber-security-awareness","status":"publish","type":"post","link":"https:\/\/sysprove.com\/ar\/the-need-for-cyber-security-awareness\/","title":{"rendered":"The Need for Cyber Security Awareness"},"content":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading source=&#8221;post_title&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;]<div class=\"centered-box gem-image-centered-box\"><div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-centered\" style=\"\"><div class=\"gem-wrapbox-inner \" ><img decoding=\"async\" class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/sysprove.com\/ar\/wp-content\/uploads\/2020\/05\/cyber-security-illustration-concept-with-people_23-2148530634-1.jpg\" alt=\"\"\/><\/div><\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]With the progress of technologies comes the progress of criminal acts. The stories we hear every day about industries being affected by cyberattacks are more than what we can count. Some of the most known attacks are the WannaCry Ransomware and the Equifax breach.<\/p>\n<p>There are various methods or as we like to call them \u201c<strong>attack vectors<\/strong>\u201d that help initiate attacks. Each attack can be initiated using one or more of these vectors. The most common attack vectors that cyber criminals have been using are email, websites, web applications, backdoors, and unpatched or legacy systems. As preventive methods, you could always patch your systems, install firewalls, proxies, and ensure there aren\u2019t any backdoors to your systems. But one thing you cannot do is patch the people or determine their behavior. We wouldn\u2019t say that people are your weakest link, but they are a part of it, and no link is whole if one side breaks.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner css=&#8221;.vc_custom_1542203551526{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_inner offset=&#8221;vc_hidden-xs&#8221; css=&#8221;.vc_custom_1542203561046{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]According to Verizon\u2019s 2019 Data Breach Report, <strong>94%<\/strong> of malware were delivered via malicious email attachments. Of course, most employees would not intentionally open an attachment knowing it could be infected. Cyber criminals are usually not one but two steps ahead, especially when they\u2019re targeting their victims \u2013 known as spear phishing.\u00a0 When an email is personalized, sent from what claims to be a legitimate entity or individual, and looks completely harmless can you really put the blame on your employees if they unintentionally cause a breach, anyone could fall for this, including yourself.[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-27241 alignnone\" src=\"https:\/\/sysprove.com\/ar\/wp-content\/uploads\/2020\/05\/desktop-300x81.png\" alt=\"\" width=\"607\" height=\"164\" srcset=\"https:\/\/sysprove.com\/ar\/wp-content\/uploads\/2020\/05\/desktop-300x81.png 300w, https:\/\/sysprove.com\/ar\/wp-content\/uploads\/2020\/05\/desktop-1024x278.png 1024w, https:\/\/sysprove.com\/ar\/wp-content\/uploads\/2020\/05\/desktop-768x209.png 768w, https:\/\/sysprove.com\/ar\/wp-content\/uploads\/2020\/05\/desktop.png 1123w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]Hoping for the best and assuming that employees already know how to look out for a potential attack is the number one mistake companies make. It is the responsibility of the company to spread awareness and conduct trainings to the people just as much as it is to implement security controls.[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]Hoping for the best and assuming that employees already know how to look out for a potential attack is the number one mistake companies make. It is the responsibility of the company to spread awareness and conduct trainings to the people just as much as it is to implement security controls.[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]Some topics which employees should be given awareness sessions on can be (but not limited to):<\/p>\n<ol>\n<li>The organisation\u2019s security policy<\/li>\n<li>The organisation\u2019s Acceptable Usage Policy (if available)<\/li>\n<li>Data classification and handling<\/li>\n<li>Types of cyberattacks (e.g. phishing, malware)<\/li>\n<li>Password Security<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]It is important to stress that awareness should be held for everyone including Managers and Executives, even if it is at a higher level. That is not only because everyone needs guidance every once in a while, but also because managers should be keen to show their commitment to both the company and the staff thus developing a greater confidence level of their leadership and governance in which employees will follow.[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]Awareness can be spread through multiple ways, some of which mentioned by SANS Institute are:<\/p>\n<ol>\n<li>Classroom-Style training (Workshop Sessions)<\/li>\n<li>Security Awareness Website<\/li>\n<li>Helpful Hints<\/li>\n<li>Visual Aids<\/li>\n<li>Promotions (such as flyers)<\/li>\n<\/ol>\n<p>There is no wrong time to spread awareness, so start today rather than tomorrow.[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]Awareness can be spread through multiple ways, some of which mentioned by SANS Institute are:<\/p>\n<ol>\n<li>Classroom-Style training (Workshop Sessions)<\/li>\n<li>Security Awareness Website<\/li>\n<li>Helpful Hints<\/li>\n<li>Visual Aids<\/li>\n<li>Promotions (such as flyers)<\/li>\n<\/ol>\n<p>There is no wrong time to spread awareness, so start today rather than tomorrow.[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]We at Sysprove are ready to help you spread awareness in your company by conducting awareness workshops that are both educational and interactive. So, let us take the weight off your back, for more information download our brochure: <u>link<\/u> or <u>contact us<\/u>[\/vc_column_text][vc_column_text css_animation=&#8221;bottom-to-top&#8221;]<em><strong>References<\/strong><\/em><\/p>\n<p>Verizon. (2019). <em>Data Breach Investigation.<\/em> https:\/\/enterprise.verizon.com\/resources\/reports\/2019-data-breach-investigations-report.pdf.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lean is a business philosophy and management system that was mostly associated with automobile manufacturing. Lean principles are derived from the Japanese manufacturing industry over 50 years ago, closely associated with Toyota Production System (TPS). <\/p>\n","protected":false},"author":2,"featured_media":27243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[65,53],"_links":{"self":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/posts\/27240"}],"collection":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/comments?post=27240"}],"version-history":[{"count":0,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/posts\/27240\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/media\/27243"}],"wp:attachment":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/media?parent=27240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/categories?post=27240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/tags?post=27240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}