Skip to main content

Cybersecurity training from employers in the past year

Cybersecurity continues to be a challenge for businesses of all sizes, especially as workers are shifting to a remote workforce globally.
Teaching paper computers
According to recent research by Promon, the Oslo-based mobile security company which last year revealed flaws in the Home Office’s Brexit app, two-thirds of remote workers in the UK have not been given any cybersecurity training from employers in the past 12 months, while 77% say they aren’t worried about their cybersecurity while working remotely.
Promon’s research into the attitudes towards cybersecurity comes after Ursula von der Leyen, president of the European Commission, warned on March 24th that cybercrime in the EU has increased due to the coronavirus outbreak. As the pandemic has forced many more people to work from home, attackers are capitalizing on the increased amount of time spent online by carrying out targeted COVID-19-related phishing campaigns which can result in the victim downloading ransomware (malware that encrypts files until a ransom is paid), or attackers gaining access to a victim’s computer.
Examples of such campaigns include a bogus email from HMRC containing a ‘new tax refund program’ set up by the Government, which, when clicked, directs to a fake webpage that harvests financial and tax information. Another example is a fake email claiming to be from the World Health Organisation, containing an attachment on new coronavirus safety measures. When opened a keylogger is downloaded, which then tracks and records every key that’s pressed on the user’s keyboard, enabling the attackers to secure passwords and other sensitive login information.
The survey also found that 61% of respondents are using personal devices when working remotely, adding an extra layer of concern as many of these are likely to be less secure than corporate-issued ones. Cybercriminals are taking advantage of decreased levels of security on personal devices connected to corporate networks, with successful attacks ringing alarm bells for employers whose sensitive corporate data is now at risk, along with individuals’ personal data, including banking information and login details.
Promon CTO and co-founder Tom Lysemose Hansen comment: “It’s concerning to find that such a large number of workers don’t have the necessary training to spot a potential cyber threat, such as a phishing email or spoofed website, as these are the main ways in which cybercriminals are executing their attacks. Organizations must ensure that staff who are working remotely are doing so in secure environments, whether that’s on personal or corporate devices, and it’s critical that they provide the necessary training and tools to ensure corporate data is protected.”
With the majority of people now working remotely, these worrying statistics show the enormous ‘flaw in the plan’ for many organizations which have left themselves unprepared when it comes to the human factor of cybersecurity – the notion that regardless of security measures in place all it requires is one person opening a link within a malicious email for serious damage to be caused.
Security awareness is not a once or twice a year activity, rather it needs to be an ongoing program whereby employees are continually reminded of the threats that are present, how to identify and report them.”
Each successful attack is ringing alarm bells for employers whose sensitive corporate data is now at risk, along with individuals’ personal data, including banking information and login details. So with attacks on the rise, and as security education seems almost non-existent, it is no wonder that cybersecurity is such a challenging battle.


Comments

Popular posts from this blog

दुनिया की सबसे ज्यादा उपयोग होने वाली वेबसाइट

आज मैंने आप लोगो के लिए बहुत ही अच्छा डाटा बेस तैयार किया है | इस डाटा बेस से आप लोगो को बहुत हे ज्यादा लाभ होगा , क्युकी इसमे सौ से ज्यादा वेबसाइट का नाम है और उसके सामने उसका लिंक भी दिया गया है | अगर आप लोगो को यहाँ डाटा बेस अच्छा लगे तो अपने दोस्तों के साथ जरूर शेयर करे |इसमे मैंने आप के यूज़ मे आने वाली बहुत सारी वेबसाइट का नाम है | उम्मीद है आप लोगो को यह जरूर पसंद आएगा ||| . How to simultaneously videos to YouTube – tubemogul.com . How to share you email address online without worrying about spam – scr.im . How to check font name of any image- myfonts.com/WhatTheFont . Best Collection of Open source fonts- google.com/webfonts . How to find data hidden in your photographs – regex.info . How to set broadcast events live over the web, including your desktop screen – livestream.com . How to search all your domain – iwantmyname.com . How to design from scratch or re-model your home in 3d- homestyler.com . How to share all your screen with anyon...

SAY NO TO SHYNESS !!!

13 Confident Ways to Overcome Your Shyness Those who have never suffered from shyness have no idea how debilitating it can be, especially for someone in a professional situation. If shyness is holding you back, learn how to get past it and become more confident. Shyness can truly hold people back --partly because those who are shy tend to avoid public situations and speaking up, and partly because they experience so much chronic anxiety. ⁣⁣ If that's you, take comfort in knowing you are far from alone--four out of 10 people consider themselves shy. But here's the good news: Shyness can be overcome. With time and effort and a desire to change, it's possible to break through. If your shyness is severe, you may need help from a therapist or counselor, but most people can overcome it on their own. Take your first steps in getting past shyness with these 13 techniques to help you become a more confident you. 1. Don't tell. There's no need to advertise your shyness. T...

MOST COMMON CYBER ATTACKS

1). PHISHING:        • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers.         • Phishing implies    the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit. 2). Viruses and Malicious Codes:        • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files.         • There is a huge variety of viruses, and each may impact the infected websites differently. 3). UI Redress:        • This technique is similar to the phising; but in this case a hacker could create a fake hidden user int...