Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel7
printablefalse

Webinar Wednesday:

...

What is a Cyber Attack?

A Cyber Attack is an offensive, unauthorised system/network access by a third party. It aims at destroying or stealing confidential information from a computer network, information system, or personal device. The person who carries out this cyber attack is called a hacker. ​

...

  • Twitter celebrity profile attacks​

  • Emails with attachments containing malware​

  • Disabled computers​

  • Data theft​

  • A breached computer used as a launch point for other attacks 

What are Misconceptions about Cyber Attacks?

Companies frequently have the misconception that they are too tiny or unimportant to be a target for hackers, even though cybercriminals might target any company. ​

...

All of these activities can be accomplished with the information they obtain.​

What is Cybersecurity and why it is important?

Cyber security is a discipline that covers how to defend devices and services from electronic attacks by nefarious actors such as hackers, spammers, and cybercriminals.​

​How does it work?

Cyber security encompasses people, processes, and technologies to defend computer systems, data, and networks from attacks. ​

​Why it is important?

Cybersecurity is crucial because it safeguards all types of data against theft and loss. Sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and government and business information systems are all included.​

Five Most Common Cyber Attacks and how to prevent?

1. Malware Attack

  • This is one of the most common types of cyberattacks.​

  • Malware refers to malicious software viruses.​

  • Blocks access to networks or computers.​

  • Malware breaches a network through a vulnerability. When the user clicks a dangerous link, it downloads an email attachment, or when an infected pen drive is used. ​

How can we prevent it?

  • Use antivirus software. It can protect your computer against malware​

  • Use firewalls. Firewalls filter the traffic that may enter your device.​

  • Stay alert and avoid clicking on suspicious links​

  • Update your OS and browsers, regularly.​

2. Phishing Attack

  • It is a form of attack wherein a hacker cracks your password with various programs and password-cracking tools.​

  • Unaware of this, the victim opens the mail, clicks on the malicious link, or opens the email’s attachment.​

  • By doing so, attackers gain access to confidential information and account credentials.​

  • They can also install malware through a phishing attack. ​

How can we prevent it?

  • Always check the “From email” address. Normally hackers use the email name of your trusted contacts. If you cannot see the email address hidden under the email name, then always click on it to check for the legitimate email id. ​

  • Scrutinize the emails you receive. Most phishing emails have significant errors like spelling mistakes and format changes from that of legitimate sources.​

  • Make use of an anti-phishing toolbar. E.g. Inforsec IQ, Gophish.​

  • Update your passwords regularly.​

3. Password attack

  • Form of attack wherein a hacker cracks your password with various programs and password-cracking tools.​

  • There are different types of password attacks like brute force attacks.​

How can we prevent it?

  • Use strong alphanumeric passwords with special characters.​

  • Abstain from using the same password for multiple websites or accounts.​

  • Update your passwords; this will limit your exposure to a password attack.​

  • Do not have any password hints in the open​

4. Insider attack

  • An insider threat does not involve a third party but an insider.​

  • It could be an individual from within the organization who knows everything about the organization.​

  • Insider threats have the potential to cause tremendous damage.​

  • Insider threats are hard to predict and hence tricky.​

How can we prevent it?

  • Organizations should have a good culture of security awareness.​

  • Companies must limit the IT resources staff can have access to depending on their job roles​.

  • Organizations must train employees to spot insider threats. This will help employees understand when a hacker has manipulated or is attempting to misuse the organization's data.​

5. SQL Injection in the Vulnerable API or Program Attack

  • ​A Structured Query Language (SQL) injection attack occurs on a database-driven website when the hacker manipulates a standard SQL query.​

  • It is carried out by injecting malicious code into a vulnerable website search box, thereby making the server reveal crucial information.​

How can we prevent it?

  • Use an Intrusion detection system, as they design it to detect unauthorized access to a network.​

  • Carry out a validation of the user-supplied data. With a validation process, it keeps the user input in check.​

Simple Tips to Avoid Cyber Attacks

  • Change your system passwords regularly and use strong alphanumeric passwords which are difficult to crack.​

  • Use a firewall and other network security tools such as Intrusion prevention systems, Access control, Application security, etc.​

  • Avoid opening emails from unknown senders. Scrutinize the emails you receive for loopholes and significant errors. ​

  • Employees should be aware of cybersecurity principles. They must know the various types of cyberattacks and ways to tackle them.​

  • Use Two-Factor or Multi-Factor Authentication. With two-factor authentication, it requires users to provide two different authentication factors to verify themselves.​

  • Secure your Wi-Fi networks and avoid using public Wi-Fi without using a VPN.​

  • Safeguard your mobile, as mobiles are also a cyberattack target. Install apps from only legitimate and trusted sources, and make sure to keep your device updated. ​

...

Entire OnHire’s three pillars of cybersecurity to prevent Cyber Attacks

1. People

  • During the onboarding process, all new employee gets the training and awareness to understand cyber risk and possible phishing attempts.​

  • Identity management enforced to have only authorized access to IT and OT Systems.​

  • All employees have signed the undertaking of the internal code of conduct with respect to information & Data Security, Non-Disclosure  Agreement, Data Privacy, and intellectual property rights protection.​

2. Process

  • Each employee’s roles and responsibilities have been defined.​

  • Asset Management Policy and tracking of its usage have been implemented.​

  • Access Management Policy and Process are in place.​

  • Physical and Environmental Security policies and Processes are in place.​

  • Vendor Management Policy (Software & Data Hosting partners) is in place.​

3. Data and Information

  • HTTPS:// Encrypted and secure websites​

  • IAM roles and policies are enforced at all IT, OT, and Users Level​

  • Data at rest is default encrypted through the SQL Server 2019 database.​

  • Mandatory Strong Passwords (Special character+ 6 digits+ numeric character​)

  • Use of Cookies and access technologies.​

  • Database & Files backups onto AWS Cloud servers​

  • AWS RDS managed service has been implemented for the best-in-class database server management with minimal in-house staff access. ​

...

​Entire OnHire's 7 Steps Approach – in case of Cyber Attacks

  1. Identify the source and its cause: We will secure our IT infrastructure with the help of the AWS engineering team.​

  2. ​Identify the type of attack: The cybersecurity response team will identify the type of attack and prepare an action plan according to that focus area to minimize the impact.

  3. Contain the Breach: After resolving the attack, the Cybersecurity response team will shut down all the backdoors from which data could be accessed. The team will disconnect the affected network, and disable all remote access and reroute all traffic. The team will change all vulnerable passwords.​

  4. Access and Repair the damage: The cybersecurity response team will determine which (if any) critical business functions have been compromised, what data has been affected by the breach, which systems have been illicitly accessed, and whether any unauthorized entry points remain. Systems may need to be reinstalled, compromised data may need to be restored from backup copies, and any damaged hardware repaired or replaced)​.

  5. Report the attack: We will promptly report the attack to the proper authorities. We will immediately contact the state and local law enforcement offices and cyber liability insurance career for advice and support.

  6. Communicate with Customers: Affected Customers will be contacted and continuously updated.

  7. ​Learn from Experience: Continuous improvement and adaptation are part of the culture at Entire OnHire. Necessary Processes, Policies, and Security parameters to be corrected will be documented and reviewed to avoid future attacks.​​

...