Has your business carefully considered the safety of working online from home?

Cybersecurity Mimecast advises all Dutch organizations working (planned) in a hybrid way to critically assess cybersecurity.
The corona pandemic has changed the threat situation forever. Working from home suddenly became commonplace. Cyber ​​criminals took advantage of this, for example by attacking domestic workers. According to Mimecast, they will also benefit from the current situation. Whether it’s full-time homework, a gradual return to the office, or a hybrid model, new attack methods emerge that your organization needs to offer.
Mimecast is based in part on an analysis of previous attack campaigns over the same period, such as company relocation or returning to the office after vacation. Risks are also increasing due to the large-scale acceptance of uncertain joint products.
Security specialists warn against four types of attacks:
The optimistic attack is the most common attack method to date. Cyber ​​criminals send emails and other messages on a large scale. For example, it attempts to trick the victim into clicking on a malicious link or downloading malware.
Simple email spoofing is a way for an attacker to collect information via social media or company websites and impersonate an employer, supervisor, colleague, friend, or family member. In this way, sensitive information such as passwords is extracted. Targeted malware attacks are increasingly using new malware that traditional malware scanners cannot detect because signatures cannot detect it. Email is the most common way to install this malware. For example, an employee is prompted to log in to a fraudulent OneDrive page.
Trademark fraud is becoming more common with the advent of software as a service (SaaS). As a result, users are accustomed to receiving email notifications that include status updates and information requests. It provides an opportunity for cyber criminals. They can perform phishing and malware attacks via fake emails that appear to have come from reputable brands. Layered security
A fully layered approach is more important than ever, and it is also important to recognize that security is a common responsibility. Departments and employees need to work together at all levels. Mimecast distinguishes between the following five layers of security:

1. Hardware
Successful attacks are not always sophisticated. Confidential documents left on unsupervised laptops, USB sticks, or coffee shops may be sufficient for cybercriminals. Organizations need to secure all physical assets wherever they are. Everyone, except you, is responsible for this.
2. Software
Virtual private networks (VPNs) contain a variety of serious vulnerabilities. Over 80% of Exchange servers connected to the Internet are vulnerable to threats. Therefore, it is imperative to update unsupported operating systems such as Windows 7 and related applications, and to fix certain vulnerabilities in network technologies that attackers regularly exploit. Personal responsibilities also include employees who faithfully carry out updates.
3 persons
For example, social engineering, where people are required to pretend to be clicking malicious links or entering passwords, is still a popular offensive tactic. Domestic workers tend to take a more relaxed approach to safety. Hybrid work can also be confusing. Is your boss on vacation or working from home? These are good conditions for spoofing and spear phishing attacks.
4. Policies and processes
Make sure your organization has a digital resilience (cyber resilience) strategy. This strategy needs to clearly explain how to prevent cybercriminals from exploiting the vulnerability. In addition, we will conduct regular safety awareness training for all employees and formulate clear policies regarding processes related to work at home and office.
5. Chain partner
Include your entire supply chain in your security strategy. If your partner or seller is the victim of a cyberattack, you too can be at risk. Therefore, prioritize information security when assessing SLAs and selecting new partners. It’s also important to keep your chain partners informed of new threats and the safeguards you take.

Leave a Reply

Your email address will not be published. Required fields are marked *