{"id":36758,"date":"2019-06-10T07:05:16","date_gmt":"2019-06-10T07:05:16","guid":{"rendered":"https:\/\/mec.ph\/?p=36758"},"modified":"2022-03-31T15:26:11","modified_gmt":"2022-03-31T07:26:11","slug":"axis-keeping-cyberdoor-locked","status":"publish","type":"post","link":"https:\/\/mec.ph\/axis-news\/axis-keeping-cyberdoor-locked\/","title":{"rendered":"Axis: Keeping your Cyber-door Locked"},"content":{"rendered":"\t\t
Locking the door\u00a0is the\u00a0initial\u00a0rule for\u00a0a secure\u00a0home. However,\u00a0once\u00a0it\u00a0involves\u00a0cybersecurity,<\/a>\u00a0you will be leaving your\u00a0system\u2019s entrance\u00a0open to\u00a0malicious users.\u00a0<\/p> \u00a0<\/p> Over the last decade,\u00a0the importance\u00a0of data<\/a>\u00a0\u2013 and what\u00a0can be\u00a0done with\u00a0it \u2013 has\u00a0led\u00a0to\u00a0a brand new breed of cybercriminals.\u00a0no longer\u00a0are\u00a0they\u00a0trying\u00a0to extort\u00a0huge\u00a0multinationals for\u00a0money\u00a0\u2013now\u00a0each\u00a0company in possession\u00a0of data, from a\u00a0consumer\u00a0database\u00a0to plans\u00a0for a brand new\u00a0product\u00a0in development,\u00a0could be a\u00a0target for hackers. Therefore, cybersecurity is\u00a0currently\u00a0a\u00a0high\u00a0priority for businesses\u00a0large\u00a0and small.<\/p> \u00a0<\/p> Vulnerability\u00a0is something\u00a0no system\u00a0will\u00a0escape and\u00a0when\u00a0adding\u00a0additional\u00a0devices to your network,\u00a0you\u2019re adding\u00a0additional\u00a0points of entry\u00a0that may\u00a0be exploited. The irony is that,\u00a0while\u00a0you may be adding additional cameras\u00a0to guard\u00a0your premises, if\u00a0they\u2019re not maintained and safeguarded against cyberattacks,\u00a0they may\u00a0be adding to your risk\u00a0of getting\u00a0your network compromised.<\/p> \u00a0<\/p> New vulnerabilities are discovered often, however, whether or not they pose a crucial risk depends on 2 factors: first the likelihood that vulnerability may be simply exploited, second the impact that its exploitation may have on the remainder of the system. just like the lock on your front door, the more durable a vulnerability is to break, the less it poses a risk.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t This doesn\u2019t mean\u00a0there\u2019s a one-size-fits-all\u00a0solution. each\u00a0business\u2019s\u00a0needs\u00a0are going to be\u00a0completely different as\u00a0they\u2019ll\u00a0have different areas of risk and\u00a0potential\u00a0\u201cpoints of entry\u201d.\u00a0the reality\u00a0is no system\u00a0is immune from being\u00a0breached\u00a0if a determined hacker has enough time and resources\u00a0accessible. Similarly, not managing internal access to a system\u00a0will\u00a0leave it\u00a0receptive to being compromised.\u00a0it\u2019s\u00a0necessary\u00a0that you simply think\u00a0about\u00a0each\u00a0internal and external threat\u00a0once\u00a0developing your cybersecurity\u00a0setup.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t There\u2019s a reason why passwords\u00a0are\u00a0referred to as\u00a0\u201ckeys\u201d.\u00a0they\u2019re\u00a0your\u00a0initial\u00a0line of defense,\u00a0therefore\u00a0you would like to make sure they\u2019re resilient, oftentimes changed which\u00a0they\u2019re\u00a0not shared\u00a0generously. You wouldn\u2019t use identical keys\u00a0for your\u00a0front door\u00a0and everything else, from your\u00a0car\u00a0to your safety\u00a0deposit box. Similarly, you wouldn\u2019t\u00a0create\u00a0a copy\u00a0of that key\u00a0for each acquaintance you meet. That\u2019s an identical\u00a0attitude\u00a0you need\u00a0to possess\u00a0when it involves passwords.<\/p> \u00a0<\/p> In cybersecurity, this threat is\u00a0represented\u00a0as accidental or deliberate misuse of the system.\u00a0you\u2019ll have employees accessing\u00a0parts\u00a0of the system\u00a0they\u2019re\u00a0not\u00a0authorized\u00a0to look at\u00a0because\u00a0a colleague or a superior shared their\u00a0password with them. This creates a potentially risky scenario,\u00a0therefore the\u00a0answer\u00a0is\u00a0to place\u00a0clear\u00a0password\u00a0policies and processes\u00a0in place\u00a0and\u00a0certify\u00a0everybody\u00a0in the\u00a0company complies with them.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Sometimes it\u2019s going to seem unneeded to update a system, particularly if it still functions smoothly. Updates will almost frighten us. What if the software has been modified completely and you\u2019ve got to spend days figuring out a way to use it? What if your previous files can\u2019t be read with the new version? What if the update makes the software incompatible with another component of your system? so we have a tendency to keep working with version 2.0 when version 4.5 is already available.<\/p> \u00a0<\/p> The older a system is, the\u00a0more\u00a0seemingly\u00a0it\u2019s\u00a0that any vulnerabilities\u00a0are\u00a0found by cybercriminals. Therefore, these systems have\u00a0a higher\u00a0probability\u00a0of being exploited.\u00a0the solution\u00a0is to update your system\u00a0frequently\u00a0because\u00a0most weaknesses\u00a0are\u00a0found by the\u00a0manufacturers,\u00a0who\u00a0run vulnerability scans and penetration tests\u00a0so as\u00a0to\u00a0locate\u00a0them. Updates and patches fix vulnerabilities and keep you safe.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Arguably, a house with tons of doors and windows may be a challenge, as you need to make sure all of them are properly closed. That\u2019s similar to your company\u2019s system; you need to observe all of your access points, for each device connected to your network, because a single vulnerable one is enough to compromise all the remainder.<\/p> \u00a0<\/p> If you have got control over your devices, you\u2019ll be able to apply identical safety customs and procedures to all of them. However, once your employees are working remotely or with their\u00a0personal smartphones, tablet, or computer,<\/a>\u00a0it gets\u00a0far more\u00a0troublesome\u00a0to identify weaknesses. Again,\u00a0the solution\u00a0is\u00a0to put\u00a0in place\u00a0policies for\u00a0the entire company,\u00a0for instance,\u00a0a rule\u00a0that permits\u00a0the employees\u00a0to access the system with\u00a0a personal device, however\u00a0as long as\u00a0it has particular\u00a0security criteria.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t This may come as a surprise, however, phishing emails are still one of the most successful strategies for getting illegal access to a system. Some phishing attempts may be quite obvious, however, others are tougher to recognize, particularly if the attacker has used social engineering techniques to review your company and better impersonate the part.<\/p> \u00a0<\/p> That\u2019s why it\u2019s crucial to train your employees, every single one amongst them, on cybersecurity best practices. Teach them to look for and spot the signals of a potential phishing email, however also offer them an email address to which they will forward suspicious messages, in order that they can be screened if unsure. never underestimate human error.<\/p> \u00a0<\/p> In conclusion, anyone with the proper quantity of will, patience, and time will hack a system. By taking steps to secure your system, you can make it expensive, in terms of your time and resources, for cybercriminals to access your network that they decide it\u2019s simply not well worth the effort to keep making an attempt.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\tKey Considerations for Network Security<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
1.) Passwords<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
2.) Legacy Systems<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
3.) Too Many Devices<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
4.) Untrained Personnel<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t