Skip to main content

Cybersecurity training from employers in the past year

Cybersecurity continues to be a challenge for businesses of all sizes, especially as workers are shifting to a remote workforce globally.
Teaching paper computers
According to recent research by Promon, the Oslo-based mobile security company which last year revealed flaws in the Home Office’s Brexit app, two-thirds of remote workers in the UK have not been given any cybersecurity training from employers in the past 12 months, while 77% say they aren’t worried about their cybersecurity while working remotely.
Promon’s research into the attitudes towards cybersecurity comes after Ursula von der Leyen, president of the European Commission, warned on March 24th that cybercrime in the EU has increased due to the coronavirus outbreak. As the pandemic has forced many more people to work from home, attackers are capitalizing on the increased amount of time spent online by carrying out targeted COVID-19-related phishing campaigns which can result in the victim downloading ransomware (malware that encrypts files until a ransom is paid), or attackers gaining access to a victim’s computer.
Examples of such campaigns include a bogus email from HMRC containing a ‘new tax refund program’ set up by the Government, which, when clicked, directs to a fake webpage that harvests financial and tax information. Another example is a fake email claiming to be from the World Health Organisation, containing an attachment on new coronavirus safety measures. When opened a keylogger is downloaded, which then tracks and records every key that’s pressed on the user’s keyboard, enabling the attackers to secure passwords and other sensitive login information.
The survey also found that 61% of respondents are using personal devices when working remotely, adding an extra layer of concern as many of these are likely to be less secure than corporate-issued ones. Cybercriminals are taking advantage of decreased levels of security on personal devices connected to corporate networks, with successful attacks ringing alarm bells for employers whose sensitive corporate data is now at risk, along with individuals’ personal data, including banking information and login details.
Promon CTO and co-founder Tom Lysemose Hansen comment: “It’s concerning to find that such a large number of workers don’t have the necessary training to spot a potential cyber threat, such as a phishing email or spoofed website, as these are the main ways in which cybercriminals are executing their attacks. Organizations must ensure that staff who are working remotely are doing so in secure environments, whether that’s on personal or corporate devices, and it’s critical that they provide the necessary training and tools to ensure corporate data is protected.”
With the majority of people now working remotely, these worrying statistics show the enormous ‘flaw in the plan’ for many organizations which have left themselves unprepared when it comes to the human factor of cybersecurity – the notion that regardless of security measures in place all it requires is one person opening a link within a malicious email for serious damage to be caused.
Security awareness is not a once or twice a year activity, rather it needs to be an ongoing program whereby employees are continually reminded of the threats that are present, how to identify and report them.”
Each successful attack is ringing alarm bells for employers whose sensitive corporate data is now at risk, along with individuals’ personal data, including banking information and login details. So with attacks on the rise, and as security education seems almost non-existent, it is no wonder that cybersecurity is such a challenging battle.


Comments

Popular posts from this blog

MOST COMMON CYBER ATTACKS

1). PHISHING:        • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers.         • Phishing implies    the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit. 2). Viruses and Malicious Codes:        • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files.         • There is a huge variety of viruses, and each may impact the infected websites differently. 3). UI Redress:        • This technique is similar to the phising; but in this case a hacker could create a fake hidden user int...

Will life ever be the same again?

Stay at home, work from home The fact is, even before COVID-19 became the catalyst, there were quite a number of employers already embracing the ever-evolving technologies that make WFH an option for their employees. They recognized that it’s no longer necessary to have employees be in an office full-time to be productive contributor to a team. Indeed, many kinds of work can be done just as effectively, if not more so, from home or anywhere. But this time, WFH was not an option but mandatory. Were employers and employees ready for workplace changes? Let’s take a quick look at the top challenges faced by employees versus business leaders/owners working from home: Barriers to effective communication top the challenges faced by both employees and business leaders/owners. Both groups also pointed out insufficient facilities, tools and devices; and that the home environment is not conducive to work as the other top challenges faced. Surprisingly, lack of trust came up last in ...

दुनिया की सबसे ज्यादा उपयोग होने वाली वेबसाइट

आज मैंने आप लोगो के लिए बहुत ही अच्छा डाटा बेस तैयार किया है | इस डाटा बेस से आप लोगो को बहुत हे ज्यादा लाभ होगा , क्युकी इसमे सौ से ज्यादा वेबसाइट का नाम है और उसके सामने उसका लिंक भी दिया गया है | अगर आप लोगो को यहाँ डाटा बेस अच्छा लगे तो अपने दोस्तों के साथ जरूर शेयर करे |इसमे मैंने आप के यूज़ मे आने वाली बहुत सारी वेबसाइट का नाम है | उम्मीद है आप लोगो को यह जरूर पसंद आएगा ||| . How to simultaneously videos to YouTube – tubemogul.com . How to share you email address online without worrying about spam – scr.im . How to check font name of any image- myfonts.com/WhatTheFont . Best Collection of Open source fonts- google.com/webfonts . How to find data hidden in your photographs – regex.info . How to set broadcast events live over the web, including your desktop screen – livestream.com . How to search all your domain – iwantmyname.com . How to design from scratch or re-model your home in 3d- homestyler.com . How to share all your screen with anyon...