{"id":1460,"date":"2021-12-21T16:12:29","date_gmt":"2021-12-21T16:12:29","guid":{"rendered":"https:\/\/www.argentxcyber.com\/blog\/?p=1460"},"modified":"2021-12-22T14:13:29","modified_gmt":"2021-12-22T14:13:29","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/www.argentxcyber.com\/blog\/index.php\/2021\/12\/21\/cybersecurity\/","title":{"rendered":"Cybersecurity &#8211; 8 Important Ways to Empower End-Users"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]We all knew Microsoft is on a mission of world domination \u2013 but judging from this dodgy email I got the other day; I did not know that it included sanitaryware and home d\u00e9cor!<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column][vc_single_image image=&#8221;1462&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<span data-contrast=\"none\">Jokes aside, how can IT professionals keep on top of the ever-evolving threat landscape, with various white and black hats competing for the ultimate prize, let alone the\u00a0end-user?\u202f\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b><span data-contrast=\"none\">Start with a Robust Cybersecurity Strategy\u202f\u202f<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Yes, we are heading to machine domination; we might as well be amid one already \u2013 see our take on why you should be buying shares in tinfoil hat companies\u00a0<\/span><a target=\"_blank\" href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2020\/09\/07\/why-identity-and-access-management-is-essential-for-organizations\/\" class=\"editor-rtfLink\" rel=\"noopener noreferrer\"><span data-preserver-spaces=\"true\">here<\/span><\/a><span data-preserver-spaces=\"true\">. While this situation can provide a headache and comedic relief in one blow, protecting the end-user is becoming a real challenge. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">So I thought of a suitable analogy for the end-user and reader writing this blog. The best I could come up with is that end-user protection against cybersecurity is like raising offspring, guiding, and being vigilant all the way. As development takes place, mistakes get made, achievements get celebrated, and all you can do is hope for the best. You hope that your values and beliefs have taken hold, good habits established, as at some point you will not be there should a dicey situation present itself.\u00a0 <\/span><span data-preserver-spaces=\"true\">At this point, the values, beliefs, good habits are the ammunition you have instilled and fought tirelessly for years, are seen as empowering the end-user who could hold the fate of your organization in their hands \u2013 or at least a portion it.\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">So while that simmers, let&#8217;s look at what we are talking about:\u00a0\u00a0<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\">Frequent reminders to brush teeth and tie up your shoelaces are like, in cyber terms, system updates and patch management. No one wants a root canal treatment.\u00a0 \u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Your systems need regular screening in search of malware etc., the same way we need regular visits to a health professional for our health check-ups.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">When out with friends, you might find yourself keeping in touch with your parents. Regular interactions with the endpoint management are crucial to ensuring all is in order and you can still access information resources.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Attend regular classes, write tests, compete with peers, or be part of cyber-based awareness, training, and ongoing evaluation.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">When you want to access some entertainment venues to blow off some steam, some form of identification would typically be required of you by security at the entrance. It would be an inquiry into who you are, what you know or have, and what you can access in cyber terms.\u00a0\u00a0<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">Supporting peers is also key to developing excellent social skills and fostering teamwork. In the cyber world, ensure that everyone is on the same page working together, highlighting inconsistencies early. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">The above are vital components to ensure that end users have the right tools in the arsenal to reduce the impact of a cyber-based attack actively. COVID-19 is many things, but most importantly forced many entities to rethink their cybersecurity strategy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">A good cybersecurity strategy should include the end-users of your company. End-users can be a great asset or a huge liability. According to\u00a0<\/span><a target=\"_blank\" href=\"https:\/\/www.tripwire.com\/state-of-security\/featured\/state-insider-data-breaches-2020\/\" class=\"editor-rtfLink\" rel=\"noopener noreferrer\"><span data-preserver-spaces=\"true\">Tripwire<\/span><\/a><span data-preserver-spaces=\"true\">, 78% of users put data at risk within organizations. They are bound to make mistakes in cyberspace but empowering them to learn from said mistakes matters. While no single article can be a silver bullet towards a holistic cyber security strategy, the following can be a starting point to achieving this.\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span data-preserver-spaces=\"true\">8 Ways an End-User Can Prevent Cyber Attacks: <\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n<ol>\n<li><strong><em>Ethical Behaviour<\/em><\/strong>: Users should be honest and report any illegal or unethical behaviour they notice.<\/li>\n<li><strong><em>Law Enforcement<\/em><\/strong>: Users should always work within the applicable local and international laws.<\/li>\n<li><strong><em>Protection of Passwords<\/em><\/strong>: Users should keep their passwords safe. They should not share or write down credentials to colleagues or strangers.<\/li>\n<li><strong><em>Physical Security<\/em><\/strong>: Security mechanisms should physically protect laptops and ensure that sensitive physical information is kept secure in file cabinets.<\/li>\n<li><strong><em>Information Storage<\/em><\/strong>: Safeguarding information based on the appropriate classification label and company compliance policy, including compliance to resilience and encryption.<\/li>\n<li><strong><em>Information Transport<\/em><\/strong>: Safeguarding information while in motion, ensuring that the chain of custody is maintained end-to-end.<\/li>\n<li><strong><em>Disposal of Information<\/em><\/strong>: Defining and adhering to the policy on information destruction. Ensure that the removal of information is aligned with the classification label to reduce residual threats to your entity.<\/li>\n<li><strong><em>Incident Detection<\/em><\/strong>: Provide users with various means to submit and escalate incidents, including a whistleblowing policy.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">Recent malware attacks have targeted various companies, large and small, from healthcare to manufacturing and everything in between. Entities that do not adopt a holistic and proactive approach to cybersecurity that includes the end-user could easily find their precious data in the hands of your competitor or worse!\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Identify critical assets in your company and work outwards, using a plan to document access requirements and resources needed. These could be devices, data sources, applications, and end-users. You can also read our resource\u00a0<\/span><a target=\"_blank\" href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2020\/09\/21\/zero-trust-considerations-and-how-it-impacts-your-organization\/\" class=\"editor-rtfLink\" rel=\"noopener noreferrer\"><span data-preserver-spaces=\"true\">here<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0on Zero-Trust &#8212; to give you the necessary nudge to take the first step.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span data-preserver-spaces=\"true\">Conclusion<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Know your users and empower them to expand your business&#8217;s security layers.\u00a0 <\/span><span data-preserver-spaces=\"true\">A better and more secure organization will always rely on its users as an asset of the People, Process, and Technology.\u00a0 <\/span><span data-preserver-spaces=\"true\">Please get in touch <a href=\"https:\/\/argentxcyber.com\/contact\">here<\/a> if you need more tailored information or an overall cybersecurity solution for your workplace and empower your end-user.<\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]We all knew Microsoft is on a mission of world domination \u2013 but judging from this dodgy email I got the other day; I did not know that it included sanitaryware and home d\u00e9cor! &nbsp;<\/p>\n","protected":false},"author":4,"featured_media":1465,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,20],"tags":[52,54],"class_list":["post-1460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-strategy","tag-cybersecurity","tag-cybersecurity-strategy"],"_links":{"self":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1460"}],"version-history":[{"count":71,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1460\/revisions"}],"predecessor-version":[{"id":1534,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1460\/revisions\/1534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/1465"}],"wp:attachment":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}