Six Tips for Online Security

(Translated from Hungarian using Google)

According to IT industry projections, by 2021, the cost of cybercrime for our assets and data will reach $ 6 billion worldwide. 90 percent of data security incidents are caused by outsiders, and only 10 percent are affected by internal employees.

Today, in addition to large companies, small and medium-sized businesses can easily become victims of attacks using psychological manipulation when they break network-based networking systems with the deception of internal people and colleagues. By increasing security, cyber criminals can protect themselves from organizations.

Kevin Mitnick, the world's most famous hacker, best-selling author and one of the best Cyber Security experts, shared Xerox's blog tips that routinely include every business in daily workflows.

  1. Be more proactive than reactive. Be up-to-date with the latest security threats that may affect your business.
  2. Learn and understand the threat you are facing as a consumer and business man.
  3. Create a risk analysis of your environment. Rewrite workers who detect security vulnerabilities.
  4. Make sure your operating system is up to date. For example, if you run only Windows 7, there will never be a high level of security features than if you are using Windows 10.
  5. Establish and expand your employees' safety knowledge. Test them for responding to a phishing attack.
  6. Ensure all online web sites, platforms, and network services, including cloud services, and make sure remote access always requires two levels of authentication.

The European Union's Data Protection Regulation (GDPR), which entered into force in May, makes security more relevant. Network security is threatened by a number of different factors, so it is important to have a multifaceted approach to data protection. Therefore, Xerox assures the reliability of its suppliers through compliance programs and sends regular customer safety newsletters to keep up-to-date customer relationship after purchase.

To view this article and many other interesting items, please refer to the source.

Source: tozdeforum.hu

Topics: Social Engineering, Speaking Engagements, two level authentication, data theft, GDPR, IT industry, phishing attacks, security breach detection, security training, security vulnerabilities, cybercrime, data security, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›
tech-texture-bg