Author: admin

  • Remote work causing security issues for system and IT administrators

    A study conducted by Remotely details the biggest challenges IT security professionals are facing with the change from in-office to remote work.

    security-concept-1.jpg
    Image: your/Shutterstock

    With remote and hybrid work becoming the norm for employees during the pandemic, system and IT administrators have found it difficult to cover all of the vulnerabilities of businesses, according to a study conducted by Remotely. The poll of 600 system and IT administrators was conducted in early January in areas of work such as education, consulting, government, financial services, telecom, marketing, sales and retail sectors.

    “I found it surprising that the amount of time IT departments spend keeping users secure, because they are managing other issues to keep employees productive. was so low despite the alarming increase in vulnerabilities during the pandemic,” said Chris Battis, Remotely’s co-founder and chief revenue officer. “Additionally, there seems to be a recognizable gap between how much time IT executives think is being spent versus how much time technical staff report is being spent on keeping users secure.”

    Protecting users from themselves

    The largest issue faced by a remote IT team in keeping users safe and productive during the pandemic is keeping employees secure on a daily basis, according to 33% of system administrator respondents. Most of the IT professionals surveyed said that the challenges came from the rapid switch from primarily in-office to remote work when the COVID-19 pandemic set in and the lack of preparation time due to the quick shift.

    Two-thirds of respondents said that on a daily basis, a big obstacle is protecting users from themselves, especially those who are using Windows OS to work remotely.

    “For the greater part of two decades Windows has proven to be an amazing standard on which enterprises could rely and build their business. However, because these devices have become progressively cheaper and more prolific, we use them everywhere more and more,” said Remotely CEO and founder Tyler Rohrer. “Most users are primarily concerned with the creation or consumption of content in the course of doing their jobs, and not security. In fact many of the attributes that drive productivity are by themselves insecure.”

    Rohrer went on to say that a variety of factors play a role in IT security, and those who do not work in the security field typically do not realize the number of variables that have to be accounted for to keep users safe in day-to-day operations. Working from convenient but not safe locations can play a large role in data security, and the type of device a user is working with also plays into how well a user can maintain their safety and still be productive.

    External protections

    Another large challenge comes with protecting employees against potential external threats. While workers were once safe behind the firewalls of their company’s in-office network, those layers of security have been lessened as workers are now utilizing personal and public networks that are typically not as secure.

    “In the modern computing era, nothing has been more seismically disruptive to companies than the shift to remote work over the past two years. Think about it: early in the pandemic, over the span of only two months, most of the corporate world left the office and was forced to dial into their networks. This left IT and system admins scrambling just to keep the lights on, never mind ensuring the resilience of their networks’ security, which has also come under unprecedented assault,” said Rohrer. “That was two years ago, and since then system admins are still forced into an untenable choice of keeping users productive, or the company safe. Automation of the mundane jobs that are keeping system administrators away from the important work of ensuring their networks are secure is the best way to meet this new world order challenge.”

    With system administrators working remotely without the advantages of the tools they once had behind in-office firewalls, 28% of those surveyed said their focus is ensuring the tools remote IT teams have access to are as good or better than the ones they had on site. Other large priorities for admins come in the form of remaining as productive as they were in the office, collaboration among their security team and tracking their own performances.

    To help combat these issues, 27% said their places of work were implementing a private cloud strategy to help keep data secure, while 26% said their companies were employing a hybrid cloud setup.

    Source: https://www.techrepublic.com/article/remote-work-causing-security-issues-for-system-and-it-administrators/

  • Phishing Attack

    Phishing Attack

    ONE CLICK AND ITS OVER


    Increasingly new hazards, viruses, and malware are being discovered as the internet grows. There are various methods to defraud individuals. New methods to determining a person’s identity. There are new techniques to get anyone’s money. Every piece of key information about you is crucial.

    The most successful and dangerous of all the cyber-attacks is phishing. Research has found that 91% of all cyber-attacks start with a phishing email.

    Due to its simplicity, effectiveness, and high return on investment, phishing remains the most common form of cyber. Today’s phishing attacks are powerful, targeted, and much harder to identify.


    WHAT IS PHISHING?
    Phishing is a type of cybercrime in which a person impersonating a reputable institution contacts a target or targets by email, phone, or text message in order to trick them into disclosing sensitive information such as personal information, banking and credit card information as well as passwords.

    TYPES OF PHISHING
    Email Phishing- Email addressed to a certain team, department, or individual.

    Clone Phishing- Cloning an email you received from a legitimate company in the past.
    Whaling- Executives, department heads, and managers are the targets of an email attack.

    Voice Phishing- You’ll receive a voicemail instructing you to visit a potentially harmful website.

    SMS Phishing- Another method of Phishing is through SMS/ Text messages.

    HOW PHISHING CAN BE HARMFUL TO YOUR BUSINESS

    Phishing is a form of cyberattack that employs fake websites and email campaigns to try and fool people into giving out personal information, downloading malware/ransomware, sometimes both.

    Furthermore, phishing attacks are becoming much more clever and prevalent on a global scale. Every year, an increasing number of attacks target organizations of all sizes, from the world’s largest companies to small businesses. The largest of corporate targets receive thousands of phishing attempts each month due to their size, reputation, and overall value. Companies of all sizes and industries must take immediate action and protect themselves.

    A SUCCESSFUL PHISHING ATTACKS CAN RESULT IN:
    Identity Theft

    Theft of Sensitive Data
    Loss Money
    Loss of Usernames and Password

    Unauthorized Transactions

    Installation of Malware and Ransomware

    Access to Systems to Launch Future Attacks

    Reputational Damage

    HOW TO STOP PHISHING ATTACKS

    • Never respond to an email/ text message/ voice message asking personal or account information.
    • Never click links that offer to connect you to a company’s website if you receive an email that seems suspicious or asks for this type of information.
    • Never open any file that attached to an email that seems to be suspicious.
    • If the email appears to be from an organization, contact the company’s customer service department by phone or from a web browser to confirm that email is legit.

    To see if anyone else has reported this scam, search up the email subject line or the word “hoax” on the internet.

  • Improve Working Remotely

    Improve Working Remotely

    Dignissimos accumsan doloribus orci nisl integer eros penatibus, nec quisquam, dapibus. Accusantium tellus magni. Beatae illum, perferendis, felis, vehicula ullamco aliquam nam dolorum lorem? Vehicula! Tempus distinctio curabitur mi amet, nemo qui velit occaecat magnam cum, ultricies officia suspendisse lectus inceptos taciti vulputate sint! Sodales ullamcorper pellentesque justo quam vehicula natoque saepe. Neque urna occaecati, corrupti soluta consequat facilisis incididunt, aliquip, corporis non!