"In for a rude shock': Cyber insecurity warnings

1 month ago 67

It is important to be alert and informed about the various activities that occur across the internet even in these times. The world is battling with a deadly virus, and some have seized this opportunity to perpetuate menace on the net. As an adaptive measure, organizations have resorted to holding meetings and work routines online, using an application called zoom. This platform seemed to be a solution provider to the restriction of physical gatherings and contact due to the pandemic, but, this feat is now being outweighed by the recent discovery of a breach in privacy in its services.

As it stands, there is still a wavering acceptance of this platform as reputable organizations are now avoiding its use due to the breach of privacy. The C.E.O of biometric-authentication specialist veridium, James Stickland says; "the covid19 crisis has forced so many organizations into taking dangerous shortcuts on security as well as falling short of regulation e.g General Data Protection Regulation (GDPR) which is now placing them on the greater risk of data breach, which is an inevitable consequence of companies who have been pressured into the adopting technology to stay afloat, without conducting the necessary rigorous assessment".

Working from home without security breach depends on the idea of maintaining good perimeter protection, for the home systems to watch for intrusion they have run inside the corporate core network. To extend the perimeter protection, a virtual private network (VPN) can be used, added to the protection for messages passed over the channel, it provides perimeter-based security. This means that access can be denied outside the perimeter, but once there is an access into the perimeter, the services are yours without restriction. The VPN serves as a protective shield over the perimeter, to get in, you will have to break through the perimeter shield.

In the bid to supervise the workforce, Managers see the need to 'follow up and keep watch', but working from home makes their work prone to cyber insecurity. We are not to be oblivious of the crime being championed by these criminals online, cyber-insecurity is real and those behind it are present and seeking whom and what to devour. Companies should rise to this danger and protect their company. Else, they may fall prey to phishing spam disguised as quotes, invoices, shipping updates, etc. Systems used in homes may not have their anti-malware defense active and once an attack is successful, the VPN stops offering protection and can begin to give access to the corporate network.

So, what is the way out of this mess? An authentication method called multi-factor authentication can work, how does this work? In order for the computer user to be granted access, the user is required to successfully present two or more pieces of evidence to an authentication mechanism, this may include knowledge, possession, and inherence. This mechanism can serve as a protective shield over the computer. This way, to gain access is only possible after evidence for accessibility is requested by the computer and offered by the user- the user alone has the key.

This does not just rely on combining a password with a biometric reading or entering a one-code address on a device that is allowed separately, it may also involve certification for applications and the machine being used, location, and times, e.t.c. These are measures that can be taken to keep the disheartening activity in check. 

Firewall software installation could also work; they are widely recommended for single computers. This software is prepackaged on some operating systems and it can also be purchased for individual computers as well. For multiple network computers, hardware routers can typically provide firewall protection. This does not just rely on combining a password with a biometric reading or entering a one-code address on a device that is allowed separately, it may also involve certification for applications and the machine being used, location, and times, e.t.c. These are measures that can be taken to keep the disheartening activity in check. 

Firewall software installation could also work, they are widely recommended for single computers. This software is prepackaged on some operating systems and it can also be purchased for individual computers as well. For multiple network computers, hardware routers can typically provide firewall protection.

When we leave our computers turned on even when it is not in use, we render our computers susceptible to this crime. Turning the computer off effectively can sever an attacker's connection to your computer. These criminals are good at what they do and do not need to have physical contact with your computers. By leaving your computers on, they can access it from their end and the rest is history. So, when you're done with the computer, turn it off immediately. This can discourage them from trying to access your computers and hacking into the system as a result



Written by Oriaku Eberechi Margaret.  Margaret is a writer and a budding digital marketer at teckexperts.com. She is also a Human Resources Management Professional and SDG change agent. When Margaret is not writing or running ads, she is a teacher and a talent developer. Margaret can be reached on LinkedIn. Connect to Margaret here.

Read Entire Article