Less than a week into October – Cyber Security month – we had already seen Facebook whistleblower Frances Haughen revealing her belief that Facebook is a national security risk; Face-book, Instagram and WhatsApp had a prolonged nap on Monday essentially forcing social media addicts to turn to less secure platforms; and IT World Canada announced that there’s a new text messaging cam going round which tricks people into installing malware on their phones. Of course, it’s only natural that, as new technologies develop, so too do new threats.
The more you know, the better equipped you will be to defend your company’s cyber battlements. So, we decided to dedicate this month’s post to that all-important aspect of any organisation – cyber-security.
Phishing is the fishing of the cyber world. It’s a strategy that lures the unsuspecting victim in and then ambushes them. The attacker (fisherman) dangles an attractive fake message (the fly/bait) in front of their victim (the innocent fish) causing the victim to open up and share information or allowing the attacker to send out malicious software (the hook). When the victim bites, it’s game over!
Clickjacking tricks the user into doing something they didn’t want to do. It does this by putting a false frame over the real content. So, for example, you might see and click a button labelled ‘Play now’, but what you’re actually clicking is a ‘Pay’ button.You might inadvertently download malware, ‘like’ a post, turn on your webcam, delete all of your emails, send personal information, allow others to take control of your computer or pay money into an account.
No, this isn’t a Sunday braai and Bring-Your-Own-Dop. It’s means Bring-Your-Own-Device and it refers to an IT policy that allows employees to use their own personal devices to access company information and data. BYOD is a vital component for future work and according to Forbes “… the BYOD market is expected to hit almost $367 billion by 2022, up from $30 billion in 2014.”
You know that frustrating process where you need to take down an important number, but every pen you try has run out of ink, so you run around like a mad person, frantically scribbling on any and every piece of paper you can find in an attempt to make one of the pens work? Well, this is nothing like that. Pen-testing is short for penetration-testing and it is a tool used to identify the vulnerabilities in your systems.
If you keep up with the latest trends, cyber security terminology and follow the 5 Cs of effective cyber security implentation, you should manage to stay on top of your company’s cyber security… with the help of Itec Central of course!
Author: John Considine – Itec Central