Don't skimp on digital security

Don't skimp on digital security
Almost every day we hear about new hacker attacks and discovered vulnerabilities in popular systems. And how much has been said about the fact that cyber attacks had a strong influence on the election results! And not only in Russia.

It seems clear that we need to take steps to protect our devices and online accounts. The problem is that until we are the victim of a cyberattack or the consequences of a security breach, the existing threats seem abstract. And resources for the modernization of protection systems are allocated on a residual basis.

The problem is not the low qualification of users. On the contrary, people have the knowledge and understanding of the need to protect against threats. But the priority of security tasks is often low. Cloud4Y will put on the Captain Obvious costume and once again remind you why digital security is important.

Ransomware Trojans

At the beginning of 2017, many IT publications named ransomware Trojans as one of the top cybersecurity threats of the year, and this prediction came true. In May 2017, a massive ransomware attack hit countless companies and individuals who were asked to β€œdonate” massive amounts of bitcoin to the attackers in order to recover their own data.

Over the course of a couple of years, this type of malware went from being common to being very, very common. This type of cyberattack worries many experts because it can spread like wildfire. As a result of the attack, the files are blocked until the ransom is transferred (on average $300), and even after that there is no guarantee of data recovery. The fear of suddenly becoming impoverished by a certain amount or even losing important commercial information will certainly become a powerful incentive not to forget about security.

Finance goes digital

Apparently, the idea of ​​the transition of a significant part of society to cryptocurrency is being postponed, at least for a while. But that doesn't mean our payment methods aren't becoming more digital. Some use bitcoins for transactions. Others are switching to Apple Pay or its equivalents. The growing popularity of apps like SquareCash and Venmo should also be considered.

With all these tools, we provide a variety of programs access to our accounts, and the programs themselves are installed on several of our devices. Most of these applications have various digital security certifications, and this is another reason to be especially vigilant about the programs, devices, and even cloud providers. Carelessness can leave your financial information and accounts vulnerable. Follow the rule of dividing gadgets into personal and corporate ones, create a system to protect employees and their workstations when accessing Internet resources, and use other financial information protection systems.

Games are filled with money

Working with finance is increasingly affecting the gaming plane. How many of your acquaintances increase the pleasure of the game through small transactions? How often do you hear stories about how a child emptied a parent's wallet by buying a bunch of "needed goodies" in an online game? Somehow, the stage when we just bought games and played them passed unnoticed. Now people connect these games to bank cards and payment systems accounts in order to be able to quickly make in-game purchases.

In some gaming areas, this has long been the norm. Moreover, on one of the sites dedicated to the review of casino games on mobile devices, it is directly stated that the use of their games and applications is unsafe, as there is a threat of theft of personal and financial data.

Nowadays, this disclaimer is felt not only on casino platforms, but in games in general. Thanks to mobile applications and console games, we often use bank accounts. This is another vulnerability that we hardly think about. It is important to make sure that the devices and programs you use are as secure as possible.

Smart 'Smart' Devices Add New Risks

This is a big topic that could be devoted to an entire article. The advent of smart devices permanently connected to the cloud could put all kinds of data at risk. In one of Research, which looked at the year's biggest cybersecurity threats, identified internet-connected cars and medical devices as the top two areas of risk.

This should give you some idea of ​​the dangers associated with using smart technology. There have already been cases of hackers stopping smart cars on the road, and the idea of ​​the misuse of smart medical devices can also scare. Smart devices are cool, but their insecurity is a serious problem that hinders the spread of such technologies.

Your electronic digital signature may fall into the wrong hands

Many companies use an electronic digital signature to receive various government services and conduct EDI. Many individuals also have EP. Someone needs it to work as an individual entrepreneur, someone needs it to solve everyday issues. But there are many hidden risks here too. To use an electronic signature, it is often necessary to use additional software that can introduce security risks, and the owner of an electronic signature requires special care and discipline when working with a signature.

The loss of the physical carrier of an electronic signature can lead to significant financial losses. Yes, even if you do not lose - risks there are. Therefore, it is critically important to observe all precautions. Alas, practice shows that the banal rules β€œdo not transfer your ES to a third party” and β€œdo not leave your ES inserted into a computer” are almost not respected. Just because it's inconvenient.

Remember that the information security specialist is directly responsible for what happens in the company. And he must make sure that the most reliable and most secure digital technology products available are implemented and used in business processes. And if not, make every effort to improve the level of digital security. If the EP belongs to you, then treat it the same way as a passport.

What else can you read on the blog? Cloud4Y

β†’ vGPU - cannot be ignored
β†’ AI helps to study the animals of Africa
β†’ 4 ways to save on cloud backups
β†’ Top 5 Kubernetes distributions
β†’ Summer is almost over. There is almost no unleaked data left

Subscribe to our Telegram-channel, so as not to miss the next article! We write no more than twice a week and only on business.

Source: habr.com

Add a comment