PREVIOUS ARTICLENEXT ARTICLE
PRESS RELEASE
By 14 July 2015 | Categories: Press Release

0

VIEWING PAGE 1 OF 1

It is a well known fact that attackers like to find low hanging fruit in order to get into an organisation’s juiciest targets. Some times this is through outside vendors, other times this is through phishing of individuals in an organisation of whom they can make use as a foothold to get into accounts with access to more valuable data. In this recent uptick in tax identity fraud, criminals have been targeting the HR departments of various companies in order to file fraudulent tax returns, says Carey van Vlaanderen CEO of ESET Southern Africa. 

What can we do?

Many smaller companies feel that they are less apt to be targets of cybercrime because they think they have “less value” as a target. Furthermore, they may feel they do not have the budget to protect themselves. Criminals can and will use any tidbit of information they can gather in order to increase their payout. 

In light of this, small businesses need to be every bit as cognizant of protection as larger organizations and to avail themselves of the many ways in which they can protect themselves at little or no extra cost. 

Two-Factor Authentication: Whenever this option is available, whether for payroll companies or when using any other online services, you should enable it. 

Anti-Phishing Scanning: When criminals become aware of poorly defended third-party sites that are of value to them, they can use their login credentials.  Using anti-phishing scanners in browsers and email can greatly decrease the likelihood of users being tricked into disclosing their login credentials. While education is very helpful (and highly recommended)  to prevent phishing, fraudsters can sometimes craft links that are compelling enough to trick all but the most expert users.  Anti-phishing scanning can be extra helpful with those particularly deceptive phish. 

Anti-Malware Technique and Technology: Criminals may also target users with malware that has keystroke logging, which would allow them to steal login credentials without having to trick users into going to a phishing site.  The usual anti-malware advice applies here: be sure to keep all your software up to date, educate your users about when it is unsafe to open attachments, and use updated anti-malware and firewall software. 

Network Segmentation: The best way to limit the damage should a criminal gain access to an organisation is to set permissions within your organisation. Allowing access to only those things a user must access, in order to do his or her job.  

Encryption: Encrypted data may be less accessible and thus less valuable to criminals. When data has been transferred onto disks, make sure that they are encrypted. Most major operating systems offer this ability at no extra cost. Encrypting sensitive data in transit is important too. Email and IM are not generally encrypted, unless you use a separate program designed to encrypt this traffic. Web traffic may be encrypted – look for HTTPS or a lock icon at the beginning of a URL to see whether the traffic has been secured. (But be aware that phishing sites sometimes use fake lock icons to inspire misplaced confidence in the unwary user.)

Whether your business is big or small the  methods are much the same (small businesses simply have less organisational and technological complexity). Thankfully, as protection technology has improved, it has also become cheaper and easier to access and to use effectively.  By taking the time to apply these protections, businesses can make themselves less attractive to criminals. 

VIEWING PAGE 1 OF 1

USER COMMENTS

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (45 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (21 votes)
Better business applications (132 votes)