Cyber Security – Main priorities

65

When thinking about a cyber security strategy there are many things to consider.  However, statistics show that most cyber security breaches emanate from 3 sources – so these are the areas to focus on

Phishing

Phishing attacks focus on tricking users, mainly through their email accounts.  The objective is fool the user that the email is from a genuine source and invites the user to take action.  Phishing emails often include a link that directs the user to a dummy site that will steal a user’s information to to open an attachment in the email.  the best defence against phishing is user awareness – teaching users how to recognise a potential phishing email

Malware

Malware is a generic term for a variety of threats including trojans, viruses and worms. Malware typically steals data or destroys something on the computer. Users should avoid clicking on links or downloading attachments from unknown senders  The best defences are ensuring your computer’s operating system uses the most up-to-date security updates and that you have strong Spam filtering on your email gateway

Password attacks

A password attack is carried out by using software to gain access to systems by cracking a user’s password. Tools that enforce strong password are the best defence, using a combination of upper and lower case letters, symbols and numbers and having at least eight characters. Regularly changing and not reusing passwords is also advisable