{"id":77734,"date":"2015-08-04T17:22:41","date_gmt":"2015-08-04T21:22:41","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-08T20:14:36","modified_gmt":"2021-08-09T00:14:36","slug":"you-can-stop-cyber-attacks","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/you-can-stop-cyber-attacks\/","title":{"rendered":"You Can Stop Cyber Attacks"},"content":{"rendered":"<p><a href=\"http:\/\/blog.frontporchforum.com\/2012\/07\/04\/bears-abound\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98042 size-medium\" title=\"You Can Stop Cyber Attacks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smokeyt.jpg?resize=141%2C150&#038;ssl=1\" alt=\"You Can Stop Cyber Attacks\" width=\"141\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smokeyt.jpg?resize=141%2C150&amp;ssl=1 141w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smokeyt.jpg?resize=71%2C75&amp;ssl=1 71w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smokeyt.jpg?w=275&amp;ssl=1 275w\" sizes=\"auto, (max-width: 141px) 100vw, 141px\" \/><\/a>Seems like every week <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/data-breach-is-no-monkey-business\/\" target=\"_blank\" rel=\"noopener noreferrer\">another<\/a> <a href=\"http:\/\/krebsonsecurity.com\/2015\/07\/cvs-probes-card-breach-at-online-photo-unit\/\" target=\"_blank\" rel=\"noopener noreferrer\">major<\/a> <strong><a href=\"http:\/\/krebsonsecurity.com\/2015\/07\/online-cheating-site-ashleymadison-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber <\/a><a href=\"https:\/\/www.politico.com\/story\/2015\/07\/federal-government-cyber-attack-breach-21-million-people-affect-119918.html\" target=\"_blank\" rel=\"noopener noreferrer\">attack<\/a><\/strong>\u00a0is\u00a0<a href=\"http:\/\/abc7news.com\/health\/ucla-health-says-it-was-victim-of-criminal-cyber-attack\/859551\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a>. Cyber attacks expose the personal details of millions of users worldwide. Companies are <a href=\"https:\/\/web.archive.org\/web\/20180731033829\/https:\/\/www.gartner.com\/newsroom\/id\/2828722\" target=\"_blank\" rel=\"noopener noreferrer\">spending over $70 billion<\/a>\u00a0to fight off cyber attacks. But even with the best systems in place, hackers can still easily breach the company\u2019s defenses if staff aren\u2019t also being security conscious.<\/p>\n<p>T<a href=\"https:\/\/news.softpedia.com\/news\/Intel-Acquires-PasswordBox-466329.shtml#sgal_2\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98044 size-medium\" title=\"Intel Security Group\u00a0(aka McAfee)\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee.jpg?resize=150%2C113&#038;ssl=1\" alt=\"Intel Security Group (aka McAfee)\" width=\"150\" height=\"113\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee.jpg?w=652&amp;ssl=1 652w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>he <em><a href=\"http:\/\/www.businessinsider.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Business Insider<\/a><\/em> spoke with <a href=\"https:\/\/web.archive.org\/web\/20180522171328\/https:\/\/www.mcafee.com\/us\/about\/management\/christopher-young.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Christopher Young<\/a>, general manager of\u00a0<a title=\"Intel\" href=\"https:\/\/www.intel.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intel<\/a>&#8216;s (<a title=\"NASDAQ : INTC\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-INTC\/\" target=\"_blank\" rel=\"noopener noreferrer\">INTC<\/a>) <a href=\"https:\/\/www.nytimes.com\/2016\/09\/08\/business\/dealbook\/intel-sells-a-majority-stake-of-cybersecurity-unit-mcafee-to-tpg.html\" target=\"_blank\" rel=\"noopener noreferrer\">Security Group<\/a> (aka McAfee) about cybersecurity. He <a href=\"http:\/\/www.businessinsider.com\/two-ways-workers-can-fight-cyber-attacks-2015-7\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <em>BI<\/em>\u00a0that employees can prevent data theft. The Intel GM says there are two things that <strong>every employee<\/strong> should be doing to <strong>help keep their company safe<\/strong> from <a title=\"Computer crime\" href=\"http:\/\/en.wikipedia.org\/wiki\/Computer_crime\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">cybercriminals<\/a>.<\/p>\n<p>\u201c<em><strong>Think before you click<\/strong>. That is the number one thing that every average employee in an organization can do,<\/em>\u201d Intel&#8217;s Young said. \u00a0He cites a recent <a href=\"https:\/\/web.archive.org\/web\/20161126161527\/http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-aspen-holding-line-cyberthreats.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Intel survey of security professionals<\/a>\u00a0(PDF),\u00a0which found that <strong>humans are still the weakest link<\/strong> when it comes to an organization\u2019s security. According to the report, successful attacks against companies most often stem from three things:<\/p>\n<ol>\n<li><a href=\"https:\/\/web.archive.org\/web\/20180622031958\/http:\/\/www.humanresourcesonline.net:80\/developing-leaders-weakest-link-emerging-asia\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98046 size-medium\" title=\"humans are still the weakest link\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/weakestlink.jpg?resize=150%2C90&#038;ssl=1\" alt=\"humans are still the weakest link\" width=\"150\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/weakestlink.jpg?resize=150%2C90&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/weakestlink.jpg?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/weakestlink.jpg?w=700&amp;ssl=1 700w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>User errors caused by <strong>lack of awareness<\/strong>,<\/li>\n<li>Unofficial use of <strong>online services<\/strong>, and<\/li>\n<li>Using <strong>social media<\/strong> sites at work.<\/li>\n<\/ol>\n<p>Basically, employees are clicking links they shouldn\u2019t be, which can give attackers a way in.\u00a0One way attackers get in is through the inbox. Mr. Young told <em>BI<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em><strong>Emails are the number one<\/strong> way that attackers are getting in &#8230; They [cyber criminals] are crafting emails and attaching malicious files to those emails and their entry points into these organizations is often through tricking the average user or click on an email attachment and launch a malicious file.<\/em><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98048 size-medium\" title=\"employees need to be vigilant and ask questions\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-super-hero.jpg?resize=150%2C100&#038;ssl=1\" alt=\"employees need to be vigilant and ask questions\" width=\"150\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-super-hero.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-super-hero.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-super-hero.jpg?w=580&amp;ssl=1 580w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>I recently <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/spear-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">wrote<\/a> how attackers have honed their <strong><a title=\"Phishing\" href=\"http:\/\/en.wikipedia.org\/wiki\/Phishing\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">spear-phishing<\/a><\/strong> skills, making dangerous emails less obvious. <em>BI <\/em>says employees need to be vigilant and ask questions about all the email they receive that raises even the slightest suspicion. Intel&#8217;s Young warns staff to <strong>question every email<\/strong>.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>You should ask why am I getting the email? Why is there a file attached to it? Why am I being asked to click on it? And you should ask all of this before clicking.<\/em><\/p>\n<p>The second big thing which <em>Business Insider<\/em> recommends that employees should do to help keep their company safe is to<strong> report any suspicious emails or attachments<\/strong>. And if someone does click on a link or download a file that raises eyebrows, report it as soon as possible so that the company\u2019s security team can investigate quickly. Mr. Young explains that an <strong>early alert can help contain an attack<\/strong>.\u00a0\u201cSo if the average employee smells something they should report it.\u201d<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em><a href=\"http:\/\/www.armstrongeconomics.com\/archives\/21370\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98050 size-medium\" title=\"report any suspicious emails or attachments\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused.jpg?resize=150%2C100&#038;ssl=1\" alt=\"report any suspicious emails or attachments\" width=\"150\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused.jpg?w=301&amp;ssl=1 301w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The IT industry needs to develop a mascot like Smokey the Bear who reminds everybody that &#8220;Only You Can Prevent Forest Fires.&#8221;<\/em><\/p>\n<p><em>Maybe we could put <a href=\"http:\/\/www.theverge.com\/2015\/6\/25\/8844365\/microsoft-clippy-sexist-leering\" target=\"_blank\" rel=\"noopener noreferrer\">Clippy<\/a> back to work to pop a little reminder every time you click on an email to open it.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.eweek.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How Enterprises Can Break the Cyber-Attack Lifecycle<\/a>\u00a0(eweek.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Staff can slow down Cyber Attacks &#8211; question emails &#038; Stay off social networks at work to prevent data breaches<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,831,2504,476,93,23,404,612,951,4,2503,564,2505],"class_list":["post-77734","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-big-data","tag-clippy","tag-intc","tag-intel","tag-malware","tag-mcafee","tag-phishing","tag-pii","tag-security","tag-smokey-the-bear","tag-social-media","tag-spear-phishing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77734"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77734\/revisions"}],"predecessor-version":[{"id":130902,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77734\/revisions\/130902"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}