ReportWire

Tag: Cybersecurity

  • Overlooking These 4 Critical Measures Expose Your Company to Cyber Attacks | Entrepreneur

    Overlooking These 4 Critical Measures Expose Your Company to Cyber Attacks | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Here’s a sobering truth: 95% of cyberattacks can be traced to human errors. The more employees you have, the greater your risk of being a cybercrime victim. We all imagine legions of hackers trying to tear through our firewalls, and yes, occasionally, some will make it through. But the much-more-common truth is that unsuspecting employees inadvertently grant those cybercriminals access to corporate systems and data, or they are influenced by these hackers to perform questionable (or even illegal) actions.

    Even worse are the willful fraudulent actions of the humans sitting between the keyboard and the chair. Some employees themselves try to cheat the system by changing amounts, bank account details, or other data to benefit their personal financial situation. Then, there are other outside humans up to no good, such as when a supplier or partner sends fake or altered documents to the company, such as vendor invoices with fake bank account details or wrong amounts.

    None of these occurrences are an indictment of company leaders, security practices or judgment. They just highlight that technology alone can’t stop every cyberattack. The key to maximizing protection and minimizing exposure to these attacks is to combine technology with the human touch.

    Related: Cybercrime Will Cost The World $8 Trillion This Year — Your Money is in Danger. Here’s Why Prioritizing Cybersecurity is Crucial to Mitigate Risk.

    1. Secure data starts and ends with humans

    Many cyberattacks succeed due to simple but preventable human error or improper reaction to a scam. For example, an employee might reveal usernames and passwords after clicking on a link in a phishing email. They might open an email attachment that unknowingly installs ransomware or other equally destructive malware on the corporate network. Or they might simply choose easily guessed passwords. These are just a few examples that can allow cyber thieves to attack.

    To minimize human error-related risks, consider implementing the following measures to ensure your business stays well-protected.

    • Strengthen employee awareness and training: Arrange periodic training on cybersecurity best practices, recognizing phishing emails, avoiding social engineering attacks, and understanding the importance of secure data handling. In 2022, around 10% of cyberattack attempts were thwarted because employees reported them, but they can only report such attempts if they recognize them.
    • Build a culture of security: Make sure everyone in their role is actively protecting company assets by promoting open communication about security issues, recognizing employees who demonstrate sound security practices, and incorporating security into performance evaluations.
    • Employ stricter access controls: Access controls limit who can view or change sensitive company data and systems. Applying the “principle of least privilege” access controls and educating employees on the risks of account sharing can limit unauthorized accesses and data leaks.
    • Use password managers: Strong passwords are difficult to crack but challenging to remember. Password manager software can create and store difficult-to-guess passwords without users having to “write them down.”
    • Enable multifactor authentication (MFA): MFA adds an extra layer of security by requiring an additional verification method — such as a fingerprint or a one-time code — just in case a bad actor does snitch an employee’s password.
    • Implement fraud detection processes for incoming documents: These processes attempt to identify fraudulent documents (like fake invoices) on receipt before they can be processed.

    2. Reduce exposure to cyberattacks and fraud with technology and automation

    While lack of awareness, training, recognition and processes account for the success of most cyberattacks, you still need technology barriers to try and keep determined hackers out of your systems. Finance and accounting offices are top targets for cyberattacks and fraudsters, so the accounts payable (AP) systems are a prime target if they do get in.

    In fact, 74% of companies experience attempted or actual payment fraud. Accounts payable fraud exploits AP systems and the associated data and documents with mischief like:

    • Creating fake vendor accounts and fake invoices for them.
    • Altering payment amounts, banking details or dates on valid invoices.
    • Tampering with checks.
    • Making fraudulent expense reimbursement.

    Related: What Is Phishing? Here’s How to Protect Against Attacks.

    3. Keeping the bad guys out

    Of course, you’ll want your IT department to use technology to thwart unauthorized attempts to access the network and systems in the first place. Besides the venerable firewall, some trusty systems include:

    • Intrusion Detection and Prevention System (IDPS) monitors network traffic for malicious activities or policy violations and can automatically take action to block or report these activities.
    • Artificial Intelligence (AI) plays a significant role in cybersecurity by using machine learning algorithms to analyze volumes of data, identify patterns, and make predictions about potential threats. It can identify attack vectors and respond to cyber threats quickly and efficiently that humans can’t match.
    • Data Encryption ensures that only authorized parties with the correct decryption key can access a file’s content, protecting sensitive data at rest (stored on devices) and in transit (across networks).

    4. Protecting against fraud from the inside

    Whether a cybercriminal slips through all those barriers or an unscrupulous employee is bent on committing AP fraud, various types of automation can detect and prevent the cyber attack from succeeding.

    • Automated monitoring of employee activities: This can help identify suspicious behavior and potential security risks. The software tracks user activity, analyzes logs for signs of unauthorized access, and regularly audits user access rights. Of course, employees should know they are being monitored and to what extent.
    • Automating the payment process end-to-end on a single platform: It takes human error (and human scruples) out of the equation, except when there’s an exception. Encrypted receipt/intake of electronic invoices from suppliers, automated matching of invoices to orders, and electronic payments —all without human intervention — are examples of how automation removes the opportunity (and temptation) to commit AP fraud.
    • Document-level change detection takes this protection one step further: This automated technology can detect when a sneaky cyberthief with access to the underlying systems makes unauthorized access attempts, modifications, or deletions to sensitive documents, including orders, invoices, and payment authorizations. These tools alert administrators and provide detailed audit trails of document activity, helping detect and prevent AP fraud, whether it comes from outside or inside.
    • Detection of unusual data patterns: Alert AP staff to take a further look before allowing the invoice to be processed and paid. Using machine learning and AI, automated systems can compare data with historical data, flagging suspicious changes in bank details, vendor’s legal name, and address as well as unusual payment amounts.

    Related: How AI and Machine Learning Are Improving Fraud Detection in Fintech

    It’s almost impossible to protect yourself entirely against cyber theft and AP fraud, especially when most of the vulnerabilities and culpabilities are human. You must focus your security efforts on the perfect balance between state-of-the-art technology and the humans between the keyboard and the chair. Proper and continuous training can reduce the human errors that allow cyberattacks to succeed. And technology and automation can help prevent attacks from reaching people in the first place. But the right combination of the two, though, is the key to defeating would-be fraudsters.

    [ad_2]

    Francois Lacas

    Source link

  • Twitter to launch encrypted direct messages with voice and video chat to follow, Elon Musk says

    Twitter to launch encrypted direct messages with voice and video chat to follow, Elon Musk says

    [ad_1]

    Twitter CEO Elon Musk announced changes to the platform’s direct messages feature including the introduction of encryption.

    STR | Nurphoto | Getty Images

    Twitter could launch encrypted direct messages on Wednesday, Elon Musk said, as the CEO outlined plans to boost communication features on the social media service.

    Musk said in a tweet late Tuesday that the latest version of the Twitter app contains changes to direct messages or DMs — nonpublic messages users send to one another.

    The CEO said users can now reply to any message in a DM thread, not just the most recent, as well as use any emoji to react to a message. Previously, users would only be able to reply to the latest message in a DM thread and only react with specific emojis.

    Musk also announced that encrypted DMs “should” be released on Wednesday.

    Encryption in messages means that only the sender and receiver are able to see a message. In theory, Twitter and Musk would not be able to see or intercept direct messages between people.

    “The acid test is that I could not see your DMs even if there was a gun to my head,” Musk tweeted.

    Facebook parent Meta said in January that it was expanding testing for default end-to-end encryption for its Messenger service. WhatsApp, the other messaging app owned by Meta, has had end-to-end encryption for several years.

    Encrypted messaging services have grown in popularity in the past few years as users focus more on privacy.

    Musk also said that voice and video calls will be added soon to Twitter so users can “talk to people anywhere in the world” without giving them a phone number.

    Since Twitter’s inception, the development of the direct messages feature hasn’t got much attention from previous CEOs. But Musk has signaled numerous times his intention to make Twitter into an “everything app” from messaging to financial services.

    New Twitter features Musk promises are not always introduced on time. In February, he said Twitter would introduce a feature to share advertising revenue with creators on the platform. That hasn’t happened yet.

    [ad_2]

    Source link

  • How to Secure Your Small Business in Today’s Cyber Landscape | Entrepreneur

    How to Secure Your Small Business in Today’s Cyber Landscape | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    In today’s digital age, small businesses face an ever-evolving threat from cybercriminals. And while many entrepreneurs believe their company is too small to be targeted, the reality is that no business is immune to attack. That’s why it’s crucial for small business owners to implement effective security measures such as Attack Surface Management (ASM) or Cyber Exposure Management to safeguard their assets and customer data from cyber threats.

    In this article, we’ll explore what ASM is, its importance in today’s cyber landscape, best practices for implementation and what the future holds for this critical aspect of cybersecurity. So buckle up, and let’s dive into the world of ASM!

    Related: Cybersecurity Practices That Protect Your Small Business

    What is attack surface management?

    Attack surface management (ASM) is an essential cybersecurity concept that refers to the process of identifying and managing all points or areas in a system, network or application where an attacker could exploit vulnerabilities. The goal of ASM is to reduce the attack surface by minimizing potential entry points for cyber threats.

    ASM involves assessing, monitoring and controlling security risks associated with various components such as hardware devices, software applications, databases, APIs and even human factors such as social engineering. It requires businesses to identify their digital assets, understand how they are connected with each other and assess their exposure to potential threats.

    Effective ASM entails continuous risk assessment through vulnerability scans and penetration testing activities to ensure that your organization’s security posture remains robust against emerging threats. By adopting proactive ASM measures like patch management, access controls implementation and user education programs, small businesses can secure themselves against malicious actors who seek unauthorized access into sensitive data.

    Attack surface management is a critical aspect of cybersecurity that every business should take seriously if they want to remain protected in today’s constantly evolving threat landscape.

    Understanding the cyber landscape

    In today’s digital age, the cyber landscape is constantly evolving and becoming increasingly complex. With the proliferation of technology comes a greater risk of cyber threats, making it essential for businesses to have a strong understanding of this environment.

    One aspect of the cyber landscape that small business owners should be aware of is the variety and sophistication of attacks. Cybercriminals are continually developing new methods to breach security measures and access sensitive information. From phishing scams to malware attacks, businesses face a multitude of potential threats.

    Another key factor in understanding the cyber landscape is recognizing that no organization is immune from attack. Small businesses may assume they are not at risk because they do not hold as much data or financial resources as larger corporations. However, any business can be targeted by attackers seeking to exploit vulnerabilities in their systems.

    It’s also important for small business owners to understand that cybersecurity requires ongoing vigilance and attention. Implementing security measures once does not guarantee protection over time since attackers will continue searching for ways into your system.

    Keeping up with industry developments regarding cybersecurity risks can help keep your company safe against continuously changing threat landscapes.

    In summary, understanding the complexities within an ever-changing cyberspace environment helps small business owners recognize emerging threats early on while implementing proactive steps towards addressing them before impact occurs.

    Related: What Small Business Owners Need to Know About Cybersecurity

    Importance of attack surface management in small businesses

    Small businesses are often the target of cyber attacks because they usually have limited security measures in place. Attackers find it easier to breach their systems, steal sensitive information and cause significant damage. This is where attack surface management comes into play.

    By implementing effective attack surface management practices, small businesses can identify potential vulnerabilities and take necessary actions to mitigate them before attackers exploit them. It involves analyzing all the possible ways that an attacker could gain access to a company’s resources or data and putting measures in place to reduce these risks.

    Attack surface management helps small businesses stay ahead of emerging threats by continuously monitoring their systems for any potential weaknesses or gaps in their security posture. It also assists them in identifying outdated software, misconfigured devices, unsecured endpoints and other areas that pose a threat.

    Small business owners must prioritize attack surface management as part of their cybersecurity strategy. By doing so, they can minimize the risk of cyber attacks and protect themselves from financial losses, reputational damage and legal liabilities that come with such incidents.

    Best practices for attack surface management

    To effectively secure your small business, it is crucial to implement attack surface management practices. Consider these best practices:

    Firstly, regularly perform vulnerability scans and penetration testing to identify potential weaknesses in your systems and networks. By doing so, you can proactively stay ahead of potential attackers. This action can be automated by implementing an Attack Surface Management or Cyber Exposure Management product.

    Secondly, restrict employee access to sensitive information, and implement a robust password policy across all accounts.

    Thirdly, ensure that all software is up-to-date with the latest security patches and updates. Outdated software can create vulnerabilities that cybercriminals can exploit.

    Fourthly, implement two-factor authentication wherever possible, which provides an extra layer of security beyond just passwords.

    It’s also essential to educate your employees on cybersecurity best practices such as avoiding suspicious emails or links and avoiding public Wi-Fi networks. Doing so can reduce the risk of attacks.

    By implementing these best practices for attack surface management in your small business, you can significantly reduce the risk of cyber attacks and keep sensitive data safe from harm.

    Related: How to Protect Your Small Business From Cyber Attacks Right Now

    Future of attack surface management

    The future of attack surface management (ASM) is quickly evolving as technology continues to advance and cyber threats become more sophisticated. To keep up with these changes, businesses need to adapt their strategies for identifying and mitigating risks.

    One major trend in the future of ASM is automation. As attacks become more complex, automated tools can help identify vulnerabilities and reduce the time it takes to remediate them. This will allow businesses to stay ahead of potential breaches while minimizing disruption to day-to-day operations.

    Another important aspect of ASM’s future is a focus on risk assessment. With so many different types of devices connected to networks, it’s essential that companies have an accurate understanding of their overall security posture. Risk assessments help organizations prioritize which areas they should address first and allocate resources accordingly.

    The rise of cloud computing has introduced new challenges for ASM. Businesses must ensure that all aspects of their cloud infrastructure are secure — from public-facing applications down to backend systems controlling access rights or storage permissions.

    As the threat landscape continues to evolve at lightning speed, those companies that invest in the latest ASM technologies and practices will be best positioned for long-term success in securing their business against cyber attacks.

    As technology continues to evolve rapidly, so will the cyber landscape. Small business owners should stay informed about new threats and solutions that arise to keep up with these changes. It is crucial for them to invest time and resources in securing their business from potential cyber attacks.

    The importance of attack surface management cannot be overstated as it provides a robust defense system against various types of malicious activities carried out over the internet. By adopting these best practices mentioned above, you can ensure your company stays protected from any potential harm posed by hackers or other malicious actors online.

    [ad_2]

    Jim Koohyar Biniyaz

    Source link

  • Listen: Fraudsters using AI to create synthetic identities | Bank Automation News

    Listen: Fraudsters using AI to create synthetic identities | Bank Automation News

    [ad_1]

    Generative AI has beneficial uses for financial institutions, but fraudsters have taken note, employing the technology to create thousands of fake identities.  The emergence of generative AI has made rooting out fake users even more challenging for financial institutions (FIs), with cybercriminals harnessing it to deepfake a person’s appearance or replicate their speaking voice, Ajay […]

    [ad_2]

    Brian Stone

    Source link

  • Hackers Target Hospitals, Disrupt Ability To Offer Patient Care | Entrepreneur

    Hackers Target Hospitals, Disrupt Ability To Offer Patient Care | Entrepreneur

    [ad_1]

    Hospitals have become an increasingly common target for cybercriminals in recent years, and the aftermath can be costly and life-threatening for patients.

    Annual ransomware attacks on hospitals more than doubled from 2016 to 2021, according to a new report published on the JAMA Network. The number of incidences jumped from 43 in 2016 to 91 in 2021. Of the targeted hospitals, 44% said their ability to deliver healthcare was impacted by the breach.

    John Riggi, a senior adviser for cybersecurity and risk at the American Hospital Association, wrote in a report that “a ransomware attack on a hospital crosses the line from an economic crime to a threat-to-life crime.”

    “Not only are cybercriminals more organized than they were in the past, they are often more skilled and sophisticated,” he wrote.

    One affected hospital, Johnson Memorial Health in Franklin, Indiana was targeted by the ransomware group “Hive,” and the hackers demanded $3 million in Bitcoin in October 2021, NPR reported.

    After consulting with cybersecurity experts at the FBI, Johnson Memorial did not pay the ransom and instead disconnected its servers following the attack.

    However, the hospital had to revert to more old-fashioned ways to carry out healthcare — including physically guarding the obstetrics unit where newborns are typically protected from unauthorized parties by security bracelets and nurses using Google translate to communicate with patients after remote translation technology was shut off after the attack.

    The hospital’s chief operating officer, Rick Kester, told NPR that it took nearly six months to “resume normal operations.”

    Related: The Jaw-Dropping Range of Cybercrimes is Due to the Gap in the Cybersecurity Workforce

    According to the Department of Justice, the Hive is responsible for over 1,500 cyberattacks since 2021 and has received more than $100 million in ransom payments. One of the affected hospitals also had to resort to analog methods to treat patients (similar to Johnson Memorial) and was unable to accept new patients immediately following the attack, the Department of Justice added.

    For hospitals, the fear of being hacked isn’t just monetary — it puts patients’ lives at risk by derailing the technology necessary to carry out patient care.

    “You ask many CEOs across the country, ‘What keeps you up at night?’ Of course, [they’re] talking about workforce, financial pressures, and they say, ‘The possibility of a cyberattack,’ Riggi told NPR.

    Related: This Type of Cyber Attack Preys on Your Weakness. Here’s How to Avoid Being a Victim.

    [ad_2]

    Madeline Garfinkle

    Source link

  • In a new hacking crime wave, much more personal data is being held hostage

    In a new hacking crime wave, much more personal data is being held hostage

    [ad_1]

    Gorodenkoff | iStock | Getty Images

    The cybersecurity world faces new threats beyond targeted ransomware attacks, according to experts at the recent RSA cybersecurity industry conference in San Francisco.

    Joe McMann, head of cybersecurity services at Binary Defense, a cybersecurity solutions provider, said the new battleground is data extortion and companies need to shift gears to face the threat.

    Traditionally, ransomware attackers encrypt or delete proprietary data of organizations and ask for ransom before reverting the attack. McMann said hackers are now focusing on stealing customer or employee data and then threatening to leak it publicly.

    “By naming, shaming, threatening reputational impact, they force the hands of their targets,” McMann said.

    The International Data Corporation predicts firms will spend over $219 billion on cybersecurity this year, and McMann said cybercriminals constantly evolve their exploitations.

    Hackers shifted tactics after ransomware attacks brought an unwelcome level of visibility by law enforcement and governments, and cybersecurity professionals became adept at solving decryption. Instead of paralyzing hospitals and pipelines, he said criminals changed gears to collect data and threaten companies with customer dissatisfaction and public outcry.

    At the end of March, OpenAI documented a data leak in an open-source data provider that made it possible to see personal AI chat histories, payment information, and addresses. The team patched the leak in hours, but McMann said once data is out there, hackers can use it.

    Hackers looking beyond corporate devices

    Chris Pierson, founder and CEO of Black Cloak, a digital executive protection company, said companies understand the growing threat of data extortion after public breaches. In the past year alone, he said Twilio, LastPass, and Uber all faced attacks that saw hackers targeting employees outside corporate security protection.

    “For example, the LastPass breach saw one of four key individuals targeted on their personal computer, through a personal public IP address getting in through an unpatched solution,” he said.

    The hackers stole credentials “outside the castle wall environment, on personal devices,” he said, using that data months later as a way into the corporate environment.

    He said the advent of home offices accelerated employee targeting. As every company transformed into a digital-first world, employees naturally started working on personal devices.

    Before the pandemic, Fortune 500 companies spent millions to secure corporate devices and buildings, but employees are not as well protected at home. “The moment an executive walks out of the building, uses their personal device or home network that they share with corporate devices, the attack surface changes,” Pierson said. What’s more, digital footprints are easy to find online, he said. “40% of our corporate executives’ home IP addresses are public on data broker websites.”

    Pierson said it only takes one vulnerable device on a home network to open up the entire network.

    Looking across the street at the RSA convention building filled with more than 45,000 industry attendants, Pierson said criminals always choose the path of least resistance.

    “You don’t have to go in through all the gear that’s out here at RSA protecting the actual company; you go through the $5 of cybersecurity at home and get everything else,” Pierson said. “Cybercriminals are targeting at a personal level because they know they can get the data, and there are no controls out there,” he added.

    New cybersecurity regulations

    There is higher visibility for cybersecurity this year with an increased number of phishing attempts and scam messages a daily occurrence for most people. And companies know that new SEC proposed guidelines will add another layer of accountability.

    When finalized, the rules would require public firms to disclose data breaches to investors within four days, and have at least one cybersecurity-experienced board member. Though a Wall Street Journal survey found three-fourths of respondents had a cybersecurity director, Pierson said companies were at RSA looking for advice.

    McMann said companies should focus on the simple fixes first and not worry about AI chat breaches if they aren’t using two-factor authentication on personal accounts. Criminals will first try older methods like ransomware before moving on to new ones.

    He said practicing for cyberattacks has become as important as any other emergency drill. On a positive note, McMann said the success of cybersecurity professionals is why criminals are looking for new modes of attack.

    “If you don’t have your operations streamlined and effective, if you don’t have good people and processes in place, don’t worry about the other stuff,” he said. “There’s a lot of fundamentals that get skipped.”

    [ad_2]

    Source link

  • The Association of Biomolecular Resource Facilities 2023 Annual Meeting, May 7-10, Boston

    The Association of Biomolecular Resource Facilities 2023 Annual Meeting, May 7-10, Boston

    [ad_1]

    Newswise — May 5, 2023 (Lexington, KY) – The Association of Biomolecular Resource Facilities (ABRF) 2023 Annual Meeting will be held May 7-10 at the Sheraton Boston Hotel.  This year’s meeting focuses on Driving Collaborative Science, and features dozens of sessions on timely topics on the latest technology and strategies for shared research resources. With close to 1000 attendees from more than 200 leading academic research institutions and commercial manufacturers attending, the ABRF 2023 Annual Meeting will be the largest event for shared research resources, or Core, facilities.

    Among the notable sessions at the 2023 ABRF Annual Meeting are:

    ABRF Award for Outstanding Contributions to Biomolecular Technologies  – presented to Dr. Chris Enke and Richard Yost for the development of the triple quadrupole mass spectrometer and the tremendous impact triple quads have made for a wide range of biomedical research applications.

    ABRF Diversity Equity and Inclusion Award – presented to Dr. Tshaka Cunningham with Polaris Genomics and Future Kings, a regional nonprofit which serves boys and girls of color from economically challenged communities through a unique, year-long afterschool educational program that guides young men and women in grades 6-12 from underserved communities to explore exciting career opportunities in science, technology, engineering, and mathematics (STEM). Their targeted focus is on cybersecurity, computer game design, biomedical sciences, and engineering.

    Keynote speakers: Beth Cimini, Ph.D., Senior Group Leader, Broad Institute will present Making More from Your Microscopy:  Advances in High-Content Image Analysis

    Ed Boyden, Ph.D., HHMI and MIT,  will close the meeting with an engaging presentation on Optical Tools for Analyzing and Controlling Biological Systems.

    Along with these key sessions, the ABRF Annual Meeting will include dozens of workshops on current developments in specific technology areas, including Genomics, Imaging, Mass Spectrometry, Flow Cytometry, and Proteomics, as well as best practices for Core Facilities Management and Leadership.  Attendees will also engage with over 70 biotechnology manufacturers and systems developers to view the latest advances in research instrumentation and tools to support their ground-breaking work. Visit the meeting web site for the latest information or contact ABRF to learn more.

     

    About the Association of Biomolecular Resource Facilities

    The Association of Biomolecular Resource Facilities is a unique membership association comprising over 2000 members working within or in the support of resource and research biotechnology laboratories. Our members represent over 400 laboratories and administrative offices in government, academia, research, industry and commercial settings. ABRF promotes education and career advancement for scientists, core administrators, and staff through conferences, a quarterly journal, publication of research group studies and conference scholarships. The society also sponsors multi-center research studies designed to help members incorporate new biotechnologies into their laboratories.

    [ad_2]

    Federation of American Societies for Experimental Biology (FASEB)

    Source link

  • Fintech Funding: Vesey Ventures launches $78M fintech fund | Bank Automation News

    Fintech Funding: Vesey Ventures launches $78M fintech fund | Bank Automation News

    [ad_1]

    Vesey Ventures has launched a fintech startup fund with $78 million in capital to help early-stage tech companies get off the ground.  The fund invested capital in five fintechs so far, including cybersecurity and identity protection firm Cyrus, and embedded foreign exchange solution Grain, among others, according to a release from the company.  Vesey is […]

    [ad_2]

    Brian Stone

    Source link

  • The $8 Trillion Risk: Why Investing in Cybersecurity Will Save You Future Pain and Risk | Entrepreneur

    The $8 Trillion Risk: Why Investing in Cybersecurity Will Save You Future Pain and Risk | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Today’s cyber threat landscape is elaborate, fast-paced and continuously evolving. The complexity of such threats has raised the predictions that the total cost of cybercrime will exceed $8 trillion by the end of 2023. It includes, for example, the money stolen by cybercriminals, the subsequent investments in security tools and services, and the money spent on ancillary activities such as staffing, remediation, legal fees, fines and more.

    So, why do many organizations still fail to see cyber hygiene or even cybersecurity as a boardroom priority, even in 2023? Many business leaders, especially small to medium-business leaders, fail to perceive themselves as targets. From their perspective, spending more on cybersecurity is a wasted effort, and those resources can be used elsewhere.

    On average, companies worldwide only allocate around 12% of their IT budget to IT security! Thus, persuading the boardroom to invest in cyber hygiene can be challenging. However, while it is hard to implement and even harder to maintain, these habits, security practices and solutions help make the world safer. And that is where every organization needs to start.

    Related: Why Is Cybersecurity Important for Your Business? Neglecting It Could Be Your Downfall.

    Reviewing the numbers

    Looking back at just a year, cyberattacks worldwide have shown a 38% increase in 2022 compared to 2021. The attack on the Australian health insurance provider Medibank, the data breach on the Los Angeles Unified School District (LAUSD) or even the social engineering hack on games company Rockstar are just a few of the thousands of data breaches happening all over the world.

    Interestingly, these breaches, like most, could have been prevented with good cyber hygiene. Furthermore, the examples I chose demonstrate that attackers seem unconcerned with a company’s size, location or industry. Yet, even with cyber threats like data breaches, phishing scams and ransomware, cybersecurity investments fall short.

    Over the last few years, we’ve made great strides in security, especially following the global pandemic. Still, a study conducted by Foundry shows that 9 out of 10 security experts still believe their organizations are not prepared to address the risks of a cyber-attack.

    Related: 5 Ways to Protect Your Company From Cybercrime

    Investing in cyber hygiene: a checklist

    So, what can we do? Establishing a strong and resilient cybersecurity architecture demands deploying security measures on multiple fronts such as data, devices, employees and network. Any elementary security architecture must include solutions to enforce strong password policies, protect data in transit and at rest, identify and protect against attacks and regularly back-up mission-critical data. This seems excessive, especially considering how limited the budget is. Yet, acquiring as many tools as possible within your financial limits shouldn’t be your final objective. The most effective strategy results from selecting the appropriate collection of tools after carefully assessing one’s demands and the current level of security precautions. The solutions I’d suggest include the following:

    • Identity and access management (IAM) solutions to ensure the right user is linked to the right resources
    • Unified endpoint management (UEM) solutions for securing endpoints and managing, patching and updating operating systems and applications
    • Extended detection and response (XDR) or Endpoint detection and response (EDR) solutions to detect and mitigate new and existing vulnerabilities
    • Remote browser isolation (RBI) for a safer browsing experience
    • Firewall as a service (FWaaS) to protect the perimeter less network border
    • Additionally, a combined implementation of Zero Trust Network Access (ZTNA) or Software Defined–WAN (SD-WAN) can provide faster connections, improve latency and secure your remote workers.

    Also, it would be wise to select solutions that already have established interconnections among them. This would offer more centralized and seamless access, thereby reducing the workload on your IT administrators and saving you from recruiting larger teams.

    Alternatively, some vendors offer multiple tools in a combined package. For example, Cisco Umbrella offers RBI, SD-WAN, and much more, Hexnode provides IAM and UEM capabilities, and Okta gives you both ZTNA and IAM. Make sure to carefully examine such vendors and the integrations between them before finalizing your architecture. In my experience, customers have always preferred a consolidated approach because, economically or due to staffing, they can’t handle the complexity of multiple solutions.

    Related: The Correlation Between Covid-19 and Cybercrime

    Roadblocks along the way

    We are all aware that the financial facet of any venture will inevitably be difficult. Assuming that the aspects mentioned above identify with your company’s objectives, the following query would most likely be regarding the return on investment. It might be challenging to locate the facts and data needed to identify the advantages of cybersecurity hygiene. I would suggest reviewing the financial implications of previous data breaches and comparing those numbers against the investment cost. You will discover that the latter dwarfs the former sum.

    Another hurdle is the monotony associated with good security hygiene. A robust security architecture requires periodic observation, maintenance and upgrades. This is often a bit boring, especially for non-tech-savvy investors, entrepreneurs and leaders. Additionally, the repetitious nature might cause inaccuracy and personnel exhaustion. The only solution is to clearly communicate the necessities of cyber hygiene and make them understand that security is an ongoing process rather than a one-time stop. Also, using tools to automate tasks and setting reminders can help employees stay on track without it being a bother.

    The recession bound to happen this year will surely put an even tighter hold on the already stretched budget. However, being the victim of a cyberassault during such trying times would be a far scarier reality. As business leaders, we must pay close attention to the hazards and repercussions of a cyberassault in our organization. Thankfully, many businesses are unwilling to face the risks associated with losing client data and having production or operations halted due to a system breach. If they do, it is either out of ignorance or a lack of a thorough understanding of the entire process.

    [ad_2]

    Apu Pavithran

    Source link

  • UK locks horns with WhatsApp over threat to break encryption

    UK locks horns with WhatsApp over threat to break encryption

    [ad_1]

    LONDON — Britain’s tough new plan to police the internet has left politicians in a stand-off with WhatsApp and other popular encrypted messaging services. Deescalating that row will be easier said than done.

    The Online Safety Bill, the United Kingdom’s landmark effort to regulate social media giants, gives regulator Ofcom the power to require tech companies to identify child sex abuse material in private messages.

    But the proposals have prompted Will Cathcart, boss of the Meta-owned messaging app, whose encrypted service is widely-used in Westminster’s own corridors of power, to claim it would rather be blocked in the U.K. than compromise on privacy.

    “The core of what we do is a private messaging service for billions of people around the world,” Cathcart told POLITICO in March when he jetted in to London to lobby ministers over the upcoming bill. “When the U.K., a liberal democracy, says, ‘Oh, it is okay to scan everyone’s private communication for illegal content,’ that emboldens countries around the world that have very different definitions of illegal content to propose the same thing,” he added.

    WhatsApp’s smaller rival, Signal, has also said it could stop providing services in the U.K. if the bill requires it to scan messages — echoing claims from the tech industry that date back more than a decade that they can’t create backdoors in encrypted digital services, even to protect kids online, because to do so opens the products up to vulnerabilities from bad actors, including foreign governments.

    “We can’t just let thousands of pedophiles get away with it. That wouldn’t be responsible or proportionate for a government to do,” Science and Technology Secretary Michelle Donelan told POLITICO in February.

    Ministers are keen to lower the temperature. But doing so will prove challenging, two former ministers told POLITICO on the condition of anonymity, given the likelihood of pushback from MPs, the complexity of the technology and the emotiveness of the issue.

    Easier said than done

    Finding a compromise is unlikely to be easy — and the row mirrors similar debates that are underway in the European Union and Australia over just how accountable tech platforms should be for potentially harmful content on encrypted services. 

    The debate over whether the requirements of the bill can be met while protecting privacy centers around “client-side scanning.” 

    While leaders at Britain’s National Cyber Security Centre and security agency GCHQ said last July they believe such technology can simultaneously protect children and privacy, other experts dispute their findings.

    A raft of cryptographers criticized the technique in a report called Bugs in Our Pockets in 2021 prompting tech giant Apple to abandon plans to introduce client-side scanning on its services. In Australia, the country’s eSafety Commissioner recently published a report highlighting how the likes of Microsoft and Apple had few, if any, mechanisms to track child sexual abuse material, including via their encrypted services.

    “This is not only companies really taking a blind eye to live crime scenes happening on their platforms, but they’re also failing to properly harden their systems and storage against abuse,” Australian eSafety Commissioner Julie Inman Grant told POLITICO. “It’s akin to leaving a home open to an intruder. Once that bad actor is inside the house, good luck getting them out.”

    WhatsApp’s smaller rival, Signal, has also said it could stop providing services in the U.K. if the bill requires it to scan messages | Damien Meyer/AFP via Getty Images

    Hacking risk

    Cybersecurity experts agree the U.K. bill’s demands are incompatible with a desire to protect encryption. They claim that privacy is not a fungible issue — services either have it or they don’t. And they warn that politicians should be wary of undermining such protections in ways that would make people’s online experiences potentially open to abuse or hacking.

    “In essence, end-to-end encryption involves not having a door, or if you want to use a postal analogy, not having a sorting office for the state to search. Client-side-scanning, despite the claims of its proponents, does seem to involve some kind of level of access, some kind of ability to sort and scan, and therefore there’s no way of confining that to good use by lawful credible authorities and liberal democracies,” Ciaran Martin, the former chief executive of the government’s National Cyber Security Centre said.

    Ministers insist that they support strong encryption and privacy, but say it cannot come at the cost of public safety. 

    Tech companies should be researching technology to identify child sex abuse before messages are encrypted, Donelan said. But the government also appears to be searching for a way to cool the row, and Donelan insisted the measure would be a “last resort.”

    “That element of the bill is like a safety mechanism that can be enacted, should it ever be needed to. It might never be needed because there might be other solutions in place,” she said.

    One official in the Department for Science, Innovation and Technology (DSIT), not authorized to speak on the record but familiar with government discussions, said DSIT wanted to find a way through and is having talks “with anyone that wants to discuss this with us.”

    Melanie Dawes, Ofcom’s chief executive, told POLITICO that any efforts to break encryption in the name of safety would have to meet stringent rules, and such requests would be made in only the most extreme situations. 

    “There’s a high bar for Ofcom to be able to require the use of a technology in order to secure safety,” she said.

    Lords debate

    Peers in the unelected House of Lords, the U.K. parliament’s revising chamber, waded into the issue Thursday.

    Richard Allan, a Lib Dem peer who was Facebook’s chief lobbyist in Europe until 2019, led the charge, saying tech companies will feel they’re “unable to offer their products in the UK under the bill.” He said undermining encryption opened the doors to hostile states and accused the government of playing a “high stakes game of chicken” with tech companies.

    But Beeban Kidron, a crossbench peer who has been leading much of the work in the Lords around child safety, said although she had some sympathy for Allan’s arguments, Big Tech companies had to do more to protect users’ privacy themselves.

    Wilf Stevenson, who is managing Labour’s response to the bill in the Lords, said he was not convinced the government’s plans were “right for the present day, let alone the future.” He added that under the bill “Ofcom is expected to be both gamekeeper and poacher,” with power to regulate tech companies and inspect private messages.

    But Stephen Parkinson, who is guiding the bill through the Lords on behalf of the government, defended the legislation. “The bill contains strong safeguards for privacy,” he said, echoing Donelan’s statement that powers to inspect messages were a “last resort” designed to be used only in cases of suspected terrorism and child sexual exploitation.

    Convincing ministers

    Messaging services including Signal and WhatsApp are hoping for a ministerial climbdown — but few see one coming.

    There is little prospect of large swathes of MPs, who will have the final say on the bill, riding to their rescue, according to two former ministers who have worked on the legislation. 

    “People are scared if they go in and fight over this, even for very genuine reasons, it could be very easily portrayed that they’re trying to block protecting kids,” one former Cabinet minister, a party loyalist, who worked on an earlier draft of the bill, said. 

    The second former minister said MPs “haven’t engaged with it terribly much on a very practical level” because it is “really hard.” 

    “Tech companies have made significant efforts to frame this issue in the false binary that any legislation that impacts private messaging will damage end-to-end encryption and will mean that encryption will not work or is broken. That argument is completely false,” opposition Labour frontbencher Alex Davies-Jones, said in a debate last June. 

    The widespread leaking of MPs’ WhatsApp messages has also undermined perceptions of the platform’s privacy credentials, the former Cabinet minister quoted above suggests. 

    “If you are sharing stuff on WhatsApp with people that’s inappropriate, there’s a good chance it’s going to end up in the public domain anyway. The encryption doesn’t stop that because somebody screenshots it and copies it and sends it on,” they lamented. 

    WhatsApp does have one ally in the former Brexit secretary and long-time civil liberties campaigner David Davis, though.

    “Right across the board there are a whole series of weaknesses the government hasn’t taken on board,” he told POLITICO of the bill.

    And on WhatsApp and Signal’s threats to leave the U.K., Davis thinks a point could be made.

    “Well, I sort of hope they do. The truth is their model depends on complete privacy,” he said.

    Update: This article has been updated to include comments from the latest House of Lords debate on the Online Safety Bill.

    [ad_2]

    Annabelle Dickson, Mark Scott and Tom Bristow

    Source link

  • Reducing Compliance Risk: A Guide to Delegating Responsibilities | Entrepreneur

    Reducing Compliance Risk: A Guide to Delegating Responsibilities | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Compliance leaders like chief information security officers are faced with the ever-growing responsibility of minimizing the risks their companies face. However, it’s not reasonable for them and their teams alone to be accountable for lowering risk. Compliance needs to be a duty that belongs — at least in part — to all members of the organization.

    This doesn’t mean passing the proverbial buck. If you’re the head of risk and compliance, you’re the one who will answer for any issues that arise. Still, you can’t be expected to do it all. That’s a recipe for health disasters. After all, 90% of CISOs say they regularly deal with at least moderate stress, online service company Nominet reported.

    To lower your chance of professional burnout, begin to delegate to others both in and out of your vertical. Feel uneasy at the prospect? There are several steps you can take to delegate responsibly and securely. That way, no one will be able to sabotage your company’s compliance efforts, and you’ll have fewer tasks to accomplish.

    Related: 7 Rules for Entrepreneurs to Delegate Effectively

    1. Map out your delegation strategy first

    Rather than just delegating duties piecemeal, construct a delegation chart. Include what you intend to delegate, who it will be delegated to, and how it will be monitored.

    For instance, security training is essential but can be time-consuming if your organization deals with sensitive information. Delegating this responsibility to a designated security employee can help alleviate the burden. Ensure that the employee is adequately trained and that their performance is monitored regularly to maintain compliance with security protocols. By delegating this responsibility, you assign ownership and authority within specific parameters while maintaining overall control.

    Once you have created your chart for particular tasks, you can feel more comfortable delegating responsibilities. Just be sure to make the chart transparent to everyone on it so people know where ownership lies.

    2. Put a premium on operationalizing security tasks (or tools that accomplish it for you)

    It can feel uncomfortable to transfer tasks, particularly those that relate to compliance and security. By operationalizing security practices into standard operational processes, such as onboarding and offboarding new employees and tech stack applications, you can safeguard against those tasks that might otherwise fall through the cracks and enable your employee base to contribute to the broader risk management strategy.

    As noted by CPO Magazine, 88% of security problems are related to human error. Adding secondary “just in case” checkups to important tasks helps identify existing errors quickly. Risk management tools should be included in your strategy to scan for and alert you to anomalies and areas of risk. Finding anomalies leads to quick alerts and opportunities for you to respond quickly.

    Verifying all your delegation workflows as a matter of course may prove advantageous if you’re audited, too. As noted by Kevin Brown, Information Security Officer at risk management platform Ostendio:

    “Security is about more than complying with a framework. Organizations should focus their efforts on data security and risk management planning first, and with the right discipline, they can develop the policies and procedures necessary to pass complex security audits.”

    You can consider implementing a tool that allows you to cross-walk across multiple security frameworks and track the implications of operational activity on security as one of those protective procedures.

    3. Generate tracking methods for all delegated assignments

    If you aren’t already using a project management software tool, consider adding one for all delegated security-related assignments. You want to have a track record that’s visible to every task’s stakeholders. This reduces the risks and threats related to potential errors or missed steps.

    Related: 5 Project Management Systems to Streamline Your Business Processes

    Ideally, the project management module or tool should make it easy to get a snapshot of what’s happening across your security landscape. At any moment, you should be able to log on and see if security, compliance and risk management tasks are up-to-date.

    In case of a problem, you’ll be glad you have a way to discover gaps and loopholes. It’s always better if you find places of concern before they cause major headaches. Tracking all communications, actions, and owners in a single source of truth makes you more efficient.

    4. Conduct risk assessments before delegating to outsourced third parties

    Plenty of third-party entities tout their abilities to keep your company compliant with security frameworks. And outsourcing some aspects of your risk management can be a smart way to delegate. The problem? You can’t control what third parties do.

    Conducting a comprehensive investigation to make sure that they’re able to live up to their promises is your best bet. After choosing a third-party vendor you feel will serve your needs, conduct a third-party risk assessment to ensure they protect your organization from a potential breach.

    Since risk is everyone’s job at your organization, be sure other departments are equally as cautious. You need to know the ways they evaluate third-party providers. The last thing you want is for someone to expose your company’s data by contracting through the wrong third party.

    5. Explain the reason behind regulation when delegating.

    To cover all your bases when delegating outside of your department, take a teaching approach. Rather than just telling others what to do, give them the reasoning behind why they’re doing it. As you know, regulations and laws can be very confusing, even to knowledgeable people. Spending time in “educator mode” stresses the importance of the task you’re delegating.

    Being informative serves an extra purpose as well. The more other employees (and not just your direct reports) understand compliance and risk management, the better. It’s much easier to get everyone on board with security practices and procedures if they’re aware of why they matter.

    Remember: Avoiding risks whenever possible is something everyone can do. Yes, it’s your job description to head up compliance and security. But you can’t make decisions for all your colleagues. Sharing key information allows anyone to make informed choices built on facts.

    You may feel like you can’t possibly pass along many of your responsibilities. But if you don’t, you’ll limit your ability to perform high-level functions. So go ahead and delegate tasks. Just make sure you’ve set up structured governance to keep everything securely on track.

    [ad_2]

    Under30CEO

    Source link

  • Global Anti Scam Alliance Launches 10 Recommendations to Turn the Tide on Scams

    Global Anti Scam Alliance Launches 10 Recommendations to Turn the Tide on Scams

    [ad_1]

    The Internet can only be made a safer place with increased international cooperation.

    Today, the Global Anti Scam AllianceAPWG and the Global Cyber Alliance officially launched the 10 Recommendations at the CyberSec Event in Brussels with a panel discussion with representatives from the European Commission, Europol and the Financial, Internet and Cybersecurity industries.

    Online scams have become a global epidemic. Consumers worldwide lost an estimated $55 billion as a result of online scams. The social and emotional trauma cannot even be measured. In many countries, online scams are the most reported type of crime, such as in the U.K., where 41% of all reported crimes are now related to online fraud, and 50% in Singapore.

    Further, the loss is likely a gross underestimate, as only 7% of all online scams are even reported. Because a mere 0.05% of all cybercriminals are caught and new technologies like Deep Fakes and ChatGPT are making it increasingly harder for consumers and law enforcement to identify deceit, online scams will continue to grow and thrive.

    Governments and security companies are largely focused on fighting the “Big Cybercrime” that target (large) corporates and national infrastructure. However, this ignores the fact that online scams are also harming consumers and diminishing their trust in the global digital economy, which now represents 15.5% of global GDP. This is unacceptable and more needs to be done to protect consumers worldwide.

    At the 3rd Global Anti Scam Summit last November, 1,300 (virtual and physical) participants collectively formulated 10 recommendations to enhance consumer protection against global scams. The 10 recommendations are:

    1. Raise Consumer Awareness on a National level, Unified & Continuously
    2. Facilitate One National, Easy, Online Reporting Platform
    3. Set up cross-organizational Support for the Fraud Victims
    4. Develop Infrastructural Tools to Protect Consumers
    5. Make Fraud Traceable Cross-Border
    6. Set up a Dedicated National Consumer Cyber Security Center
    7. Establish a Global Scam Data Sharing Hub
    8. Make Service Providers responsible & Liable for Fraud Enablement
    9. Allow Preventive Action (Warn, Block, Stop)         
    10. ​Enact an International Scam Investigation & Prosecution Network

    “GCA has supported the Global Anti Scam Summit from its very first edition,” said Alejandro Fernández-Cernuda, Director of Engagement and moderator of the panel. “The evolution of the initiative, from a gathering of experts to a call to action against online fraud endorsed by key players worldwide, demonstrates the real power of well-coordinated multi-stakeholder collaboration,” he added. 

    Jorij Abraham, General Manager of the GASA and ScamAdviser, comments, “Defining these 10 recommendations has only been a first step. Now, we will focus on getting companies as well as consumers to endorse these recommendations and put pressure on governments that change is not only required but also has to happen fast in order to stop the flood of online scams. At the 4th Global Anti Scam Summit, we will further define each of the Ten Recommendations in order to Turn the Tide on Scams.”

    Foy Shiver, Deputy-Secretary General of APWG, adds: “From my first call with Jorij Abraham, I was excited at the opportunity to work with an organization as passionate as APWG at making the cyber world a safer place for everyone. Collaborating on sharing threat data, producing networking events and now supporting the 10 recommendations presented today show how together we can improve security for every consumer worldwide.”

    Source: Global Anti Scam Alliance

    [ad_2]

    Source link

  • Elon Musk is reportedly planning an A.I. startup to compete with OpenAI, which he cofounded

    Elon Musk is reportedly planning an A.I. startup to compete with OpenAI, which he cofounded

    [ad_1]

    Tesla CEO Elon Musk and his security detail depart the company’s local office in Washington, January 27, 2023.

    Jonathan Ernst | Reuters

    Tesla CEO Elon Musk is planning to launch an artificial intelligence startup that would go head-to-head with OpenAI, the Financial Times reported Friday.

    Musk — the CEO of Tesla, SpaceX and Twitter — has been building a team of researchers and engineers and has been in conversation with multiple investors, the Financial Times reported, citing sources familiar with the matter. He has also reportedly been recruiting from other top AI firms, including Alphabet-owned DeepMind.

    related investing news

    CNBC Pro

    “It’s real and they are excited about it,” a source familiar with the matter told the Financial Times.

    Musk has secured thousands of Nvidia GPU processors, according to the report. Those chips are an integral part of building a large language model, or LLM, to compete with OpenAI’s GPT. Musk said he was acquiring the processors for his companies in a Twitter Spaces interview with the BBC this week.

    “It seems like everyone and their dog is buying GPUs at this point,” Musk said. “Twitter and Tesla are certainly buying GPUs.”

    Musk was once a major financial backer at OpenAI, committing $1 billion over multiple years, according to an earlier report from Semafor. But Musk backed out of his financial and operational commitments to the artificial intelligence firm at the same time OpenAI added a for-profit business segment. Microsoft invested $1 billion in OpenAI shortly after Musk ruptured with the group and, earlier this year, committed to a new multibillion-dollar investment.

    Musk has publicly questioned ChatGPT-creator OpenAI’s approach. In March, Musk signed an open letter calling for an immediate, six-month-long halt on any research on AI models more advanced than OpenAI’s GPT-4. He has said AI is “one of the biggest risks to the future of civilization.”

    Musk’s reported venture could become the latest entrant to an increasingly crowded space. Beyond Microsoft and Google, Amazon announced Thursday that it’s entering the generative AI space.

    Musk did not immediately respond to CNBC’s request for comment.

    Read more at the Financial Times.

    [ad_2]

    Source link

  • How to Protect Your Business Through Secure Digital Experiences | Entrepreneur

    How to Protect Your Business Through Secure Digital Experiences | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Passwords were once seen as a credible way to improve security, but with the advancing threat landscape and the increase of bad actors using easy-to-crack passwords as an entry point for far-reaching crimes, passwords have outlived their usefulness in providing the necessary level of security. From social engineering to phishing and brute-force attacks, passwords can be one piece of the security puzzle, but a multi-layered approach is now best for ultimate cyber resilience.

    A major inhibitor to password effectiveness is the inconvenience, which promotes the reuse of the same weak password across multiple accounts. A recent survey of consumers worldwide found that 61% will choose a competitor offering an easier login experience, and 59% admitted they abandoned an online experience because the login experience was too frustrating.

    In a convenience-wins world, one way to earn customer loyalty is to provide a passwordless experience where individuals aren’t burdened by the headaches of changing, managing and constantly inputting passwords while still feeling confident that their data is secure.

    Related: Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

    Understanding passwordless

    Passwordless authentication can be delivered using multiple digital experiences, each with its own advantages, which can serve different types of users. For example:

    • Biometrics: physical characteristics captured by your device, like fingerprints or facial recognition, to verify a user’s identity.
    • Security keys: physical devices that generate one-time codes used for authentication.
    • Email magic link: sends a secure login link to your email address for seamless access.
    • QR codes: highly secure authentication that doesn’t require entering a username or password.

    The highly personal and multi-step nature of these authentication methods makes them more secure and more difficult to compromise. They’re also easier and more convenient and eliminate the need to remember multiple passwords or be tempted to reuse the same one across multiple accounts. Many of these methods can be implemented to support high-security requirements by using phishing-resistant standards (including FIDO and WebAuthN).

    Related: Passwords Are Now a Weakness — Here’s Why It’s Time to Eliminate Them.

    Tailoring authentication needs to the industry

    Retail, finance and insurance industries all have different requirements for authentication, and experiences need to be tailored to fit a range of security and consumer needs. The key is always ensuring that the online identity represents the real human it claims. This diligence is necessary for protecting against fraudulent activity and ensuring the security of sensitive information.

    Retail websites often require less complex methods, such as an email magic link. In contrast, insurance and financial websites may require more rigorous methods, such as document verification from a driver’s license or passport and biometric authentication to comply with regulatory requirements.

    Using machine learning in passwordless authentication

    One benefit of passwordless is that it can be simplified by using artificial intelligence to analyze user behavior, identify patterns, and assess risk. Using machine learning algorithms to analyze user activity and log typical (or flag atypical) behavior patterns is a good example. These patterns – such as how a user types on a keyboard, the websites they prefer to visit, or what time of day they log in – could then be used to authenticate the user without the need for a password.

    This intelligence also identifies potential threats and vulnerabilities by monitoring user activity and analyzing data. Organizations can identify patterns that may indicate a security threat or vulnerability and take action to mitigate the risk. Implementing the correct tools here can help prevent Bot and Account Take Over (ATO) attacks.

    Related: Why Physical Security For Your Business Is Just as Critical as Online Security

    Steps to creating a passwordless experience

    If you see the benefits of creating a passwordless experience for employees and customers, here is how you get there:

    1. Design a strategy that maps your customer journeys for their first visit and return visits, including which types of devices, computers, and browsers they will likely be using and how often they will be on the site. Ensure that your passwordless authentication methods are compatible with your customers’ devices and platforms.
    2. Assess the amount of identity assurance needed against the friction customers are willing to endure. Regardless of the type of website, choosing the right method is crucial. Organizations must select an authentication method that aligns with their customers’ needs and their platform’s requirements. For instance, facial recognition is a convenient option for mobile devices, while security keys are more suitable for desktop environments.
    3. Give a passwordless option, even if some customers keep passwords because they’re more comfortable with them. This allows a company to cater to a broader range of user preferences and needs. Include education on passwordless such as how it works and how to use it. Many users are accustomed to using passwords and may be hesitant to try a new authentication method. Providing clear and concise information on passwordless authentication and its security advantages can help steer customers toward this option.
    4. Use intelligence to reduce friction for a seamless user experience. Authentication should be simple and intuitive for users without requiring additional steps or creating unnecessary friction. Placing risk and context awareness toolsets in your authentication flow ensures friction is low and security remains strong.
    5. Extensively test with people who represent your user population. The people at your company are likely not the targets of your service, so be sure to test the right individuals to ensure its efficacy, compatibility and ease of use. Testing should be done with different devices, browsers, and operating systems.

    Achieving a passwordless future

    The security of a website isn’t solely dependent on the presence or absence of passwords. Other security methods, including encryption, access controls, and security protocols, also play a valuable role in website security. Still, passwordless authentication and verification are important aspects of a comprehensive security strategy.

    With the increasing security risks associated with passwords, the shift toward a passwordless future can provide significant benefits for both businesses and customers. With the right approach, passwordless authentication can become the norm for all customers as they access online accounts and services, making seamless and secure digital experiences commonplace.

    [ad_2]

    Jason Oeltjen

    Source link

  • Addressing 3 prongs to cybersecurity | Bank Automation News

    Addressing 3 prongs to cybersecurity | Bank Automation News

    [ad_1]

    Financial institutions must consider personnel, physical security and technical security when safeguarding their data and operations against cybercrimes.   “You must look at all three as a combined piece, especially if you think about that personnel piece in a hybrid environment,” Sue Gordon, former Principal Deputy Director of National Intelligence, said at the recent CBA Live event in Las Vegas. “How […]

    [ad_2]

    Amanda Harris

    Source link

  • FBI warns against using public phone charging stations

    FBI warns against using public phone charging stations

    [ad_1]

    People charge their mobile devices at a Street Charge station in the Brooklyn Borough of New York.

    Brendan McDermid | Reuters

    The FBI recently warned consumers against using free public charging stations, saying crooks have managed to hijack public chargers that can infect devices with malware, or software that can give hackers access to your phone, tablet or computer.

    “Avoid using free charging stations in airports, hotels or shopping centers,” a tweet from the FBI’s Denver field office said. “Bad actors have figured out ways to use public USB ports to introduce malware and monitoring software onto devices. Carry your own charger and USB cord and use an electrical outlet instead.”

    The FBI offers similar guidance on its website to avoid public chargers. The bulletin didn’t point to any recent instances of consumer harm from juice jacking. The FBI’s Denver field office said the message was meant as an advisory, and that there was no specific case that prompted it.

    The Federal Communications Commission has also warned about “juice jacking,” as the malware loading scheme is known, since 2021.

    Consumer devices with compromised USB cables can be hijacked through software that can then siphon off usernames and passwords, the FCC warned at the time. The commission told consumers to avoid those public stations.

    [ad_2]

    Source link

  • AI Can Crack Most Passwords Instantly, Make Yours Safer Now | Entrepreneur

    AI Can Crack Most Passwords Instantly, Make Yours Safer Now | Entrepreneur

    [ad_1]

    In our ever-expanding digital world, passwords are an inevitability: email, apps, subscriptions and loyalty programs — nearly everything is designed to be secure behind a self-set code that permits entry. According to technology site TechCo, the average person has about 100 passwords, so it’s no surprise that when signing up for a new account, individuals can sometimes get lazy with word choice. However, there’s a new risk to password vulnerabilities: artificial intelligence.

    A new report by Home Security Heroes found that 51% of common passwords can be cracked in less than a minute using an AI password cracker, and 81% can be cracked in less than a month.

    Home Security Heroes used the AI password cracker PassGAN to run through a list of 15,680,000 passwords. The odds of AI decoding one’s password increase when a password has a minimal amount of characters and lacks variety (only using lowercase, only using numbers, etc.). Still, it found that it took PassGAN less than six minutes to crack a password of seven characters, even when it contained symbols.

    Related: Elon Musk Says We Should Stop Rapid AI Development Right Now — Here’s Why

    How to set a password that’s safe from AI:

    According to Home Security Heroes’ findings, it takes AI significantly longer to crack a password with more characters and variety. In essence: The longer the password and the more letters, numbers and symbols you use, the safer it is from AI.

    A password with 14 characters composed of upper and lower case letters, symbols and numbers takes AI an average of 187 million years to crack, as opposed to a password of seven characters composed of just upper and lower case letters — which takes AI an average of 22 seconds to crack.

    Although it might be more time-consuming, if you want to ensure password security as AI technology advances, it’s best to keep your passwords at least 10 characters long, with some combination of upper and lower case letters, symbols and numbers.

    Related: How AI Is Shaping the Cybersecurity Landscape — Exploring the Advantages and Limitations

    [ad_2]

    Madeline Garfinkle

    Source link

  • U.S. searches for source of highly classified intel leak

    U.S. searches for source of highly classified intel leak

    [ad_1]

    Highly classified military and intelligence documents that appeared online, with details ranging from Ukraine’s air defenses to Israel’s Mossad spy agency, have U.S. officials scrambling to identify the leak’s source, with some Western security experts and U.S. officials saying they suspected it could be someone from the United States.

    Officials say the breadth of topics addressed in the documents, which touch on the war in Ukraine, China, the Middle East and Africa, suggest they were leaked by an American rather than an ally.

    “The focus now is on this being a U.S. leak, as many of the documents were only in U.S. hands,” Michael Mulroy, a former senior Pentagon official, told Reuters in an interview.

    Pentagon building, Arlington, Virginia.

    (AP)

    U.S. officials said the investigation is in its early stages and those running it have not ruled out the possibility that pro-Russian elements were behind the leak, which is seen as one of the most serious security breaches since more than 700,000 documents, videos and diplomatic cables appeared on the WikiLeaks website in 2013.

    The Russian embassy in Washington and the Kremlin did not respond to requests for comment.

    Following disclosure of the leak, Reuters has reviewed more than 50 documents labeled “Secret” and “Top Secret” that first appeared last month on social media websites, beginning with Discord and 4Chan. While some of the documents were posted weeks ago, their existence was first reported on Friday by the New York Times.

    Reuters has not independently verified the authenticity of the documents. Some giving battlefield casualty estimates from Ukraine appeared to have been altered to minimize Russian losses. It is not clear why at least one is marked unclassified but includes top-secret information. Some documents are marked “NOFORN,” meaning they cannot be released to foreign nationals.

    Two U.S. officials told Reuters on Sunday that they have not ruled out that the documents may have been doctored to mislead investigators as to their origin or to disseminate false information that may harm U.S. security interests.

    One of the documents, dated Feb. 23 and marked “Secret,” outlines in detail how Ukraine’s S-300 air defense systems would be depleted by May 2 at the current usage rate.

    Such closely-guarded information could be of great use to Russian forces, and Ukraine said its president and top security officials met on Friday to discuss ways to prevent leaks.

    Watching allies

    Another document, marked “Top Secret” and from a CIA Intel update from March 1, says the Mossad intelligence agency was encouraging protests against Israeli Prime Minister Benjamin Netanyahu’s plans to tighten controls on the Supreme Court.

    The document said the U.S. learned this through signals intelligence, suggesting the United States had been spying on one of its most important allies in the Middle East.

    In a statement on Sunday, Netanyahu’s office described the assertion as “mendacious and without any foundation whatsoever.”

    Another document gave details of internal discussions among senior South Korean officials about U.S. pressure on Seoul to help supply weapons to Ukraine, and its policy of not doing so.

    A South Korean presidential official said on Sunday the country was aware of news reports about the leaked documents and it plans to discuss “issues raised” with Washington.

    The Pentagon has not addressed the contents of any specific documents, including the apparent surveillance of allies.

    Two U.S. officials, speaking on condition of anonymity, said that while there was concern about the leak at the Pentagon and intelligence agencies, the documents showed a snapshot in time from more than a month ago, rather than more recent assessments.

    The two officials said the military and intelligence agencies were looking at their processes for how widely some the intelligence is shared internally.

    The White House referred questions to the Pentagon.

    The Pentagon on Sunday reiterated it was reviewing the matter and had made a formal referral to the Department of Justice asking it to investigate the incident.

    The U.S. Justice Department said on Friday it was in touch with the Defense Department and began a probe into the leak. It declined further comment.

    Officials are looking at what motivations a U.S. official or a group of officials would have in leaking such sensitive information, said one of the officials who spoke to Reuters.

    The official said investigators were looking at four or five theories, from a disgruntled employee to an insider threat who actively wanted to undermine U.S. national security interests.

    [ad_2]

    Source link

  • Lock in a Lifetime of VPN Protection for Less Than $20 | Entrepreneur

    Lock in a Lifetime of VPN Protection for Less Than $20 | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Cybersecurity is a buzz topic for many businesses. But if you think you’re too small to be targeted by a cyber attack, think again. Small businesses are still targets of cybercrime, and an astounding 60% go bankrupt after an attack, according to a Help Net Security article.

    You don’t need a complete cybersecurity team to protect your business. Sure, it’s nice to have, but few entrepreneurs have that kind of budget. At the minimum, you should browse the internet with a VPN. And through April 11, you can get a specially reduced price on Ivacy VPN.

    Ivacy VPN protects your browsing with powerful 256-bit encryption without sacrificing browsing speeds. Ivacy won the 2019 BestVPN.com Fastest VPN Award. You can bypass geo-restrictions by connecting to more than 1,000 servers in more than 50 countries. It’s even fast enough to support uninterrupted P2P file-sharing with complete anonymity.

    Ivacy VPN will protect your browsing data against hackers, spyware, government surveillance, and even Ivacy itself, the company says. With a strict no-logging policy, your data remains anonymous even to them, ensuring you and your data remain completely anonymous when connected. With the flexibility to support five devices, you’ll enjoy elite security on your entire device arsenal while overcoming ISP speed throttling and port blocking.

    Load up on security with an official National Cyber Security Alliance partner. Every small business should have VPN protection, but it doesn’t have to break the bank.

    Through 11:59 p.m. PST on April 11, get a lifetime subscription to Ivacy VPN with support for up to five devices for an extra $21.99 off — just $18.99 with promo code IVACY5.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Cybersquatting a bank security concern post-SVB | Bank Automation News

    Cybersquatting a bank security concern post-SVB | Bank Automation News

    [ad_1]

    Cybercriminals never let a good crisis go to waste.   One online security concern that has resurfaced following the recent turmoil in banks like Credit Suisse and Silicon Valley Bank is cybersquatting.  Cybersquatting is the act of registering a domain name similar to that of a reputable financial institution or other company and then emailing […]

    [ad_2]

    Brian Stone

    Source link