Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

Be an organization’s security champion

  • Taylor Hall
  • December 6, 2021
Courtesy of CFE Media and Technology
Courtesy of CFE Media and Technology
Total
0
Shares
0
0
0
0

The Department of Homeland Security, via the National Cyber Awareness System (NACS), recently released a report on the extent that malicious actors are turning concern over the COVID-19 virus into opportunities to steal user data. The report details four classifications of attack that are most commonly seen and should be avoided by a security champion:

  • Phishing
  • Malware distribution
  • Registering COVID-related web sites
  • Targeted attacks against newly deployed remote access machines.

Businesses are doing everything they can to keep the walls shored up and the doors shut against digital threats, but so much of what can be done lays in the hands of the employees. Access routes to company systems are what hackers are looking to co-opt, so there must be a security champion for organizations. Below are some tips that will help someone carry the banner of digital security for their company.

1. Verify the integrity of the security software

Windows Defender is not always enough, and unfortunately gone are the days that Apple devices are safe from digital threats. Forbes reported earlier this year that “Mac threats outpace Microsoft Windows by 2 to 1.” Check with the IT department to learn the current security policy, and then own the smooth operation of it by keeping both the computer and this software up to date.

2. Reboot computers often

Most software installs and updates require a reboot, so they can write to system files without messing things up during active use. Downloading a security update for devices or anti-virus software does not afford the user the new protections until this reboot is complete.

3. Lock down the workstation

Email, file shares and communication platforms. Things people can’t do their job without, but also all the avenues that hackers can step in to impersonate someone. A champion of security cannot allow themselves to be used as the in-route for their coworker’s data being phished or compromised.

Protecting a device includes configuring screen saver timers, making sure a work computer requires a password on wake and taking regular stock of the space around the computer when someone is not actively accessing company resources.

A lot of people are working from home for the first time, as roles have not necessitated it up till this year. Even allowing family or friends to view or access information on a work computer could be a breach of contract and NDA depending on the work environment and the nature of work.

In the words of J.R.R. Tolkien, “Keep it Secret. Keep it Safe.”

4. Two-Factor/Multi-Factor Authentication

Passwords are easier to crack than ever before, and with each advance in technology they become harder to obscure. Because of this, people should be aiming for a password with a length of at least 13 characters, peppered with symbols and letters which do not match dictionary words. Change the password of all work accounts on the schedule set by the IT department, and if allowed utilize a password keeper to minimize the number of passwords that need to be memorized.

Other keys can be added to protect accounts, usually: something someone knows, something someone has or something someone is. Multi-factor authentication (MFA), is the integration of these keys, so that the user must provide more than a work email address and password to access company resources.

The most common of these is a text or app-based code that is sent directly to the user, one which expires soon after creation. This way, an actor would need both your account credentials and phone to impersonate an employee. Please speak to the IT department to learn which internal resources are eligible for MFA protection.

5. Eyes up, security champion

If an email looks off, it probably is.

Phishing works best when someone passively follows the instructions in the fraudulent request. Red flags should go up if someone sees broken image links, calls to action regarding financial information or password resets or any generic request to click a link in an email.

Even if the sender claims to represent an account or service that someone uses frequently, people should still express caution. It is safer to google the website or service directly and log in with the account credentials there.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Taylor Hall

Related Topics
  • CFE Content
  • Featured
Previous Article
  • Regulations

A guide to NIS Directive compliance

  • Erin Anderson
  • December 3, 2021
Read More
Next Article
  • IIoT & Cloud

How industrial control systems can be secure in the cloud

  • David Masson
  • December 7, 2021
Read More
You May Also Like
SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
Read More

IDS developed for industrial control systems

Six key constituents can drive targeted solutions to the ICS environment: 1. Audit and application of security policies and procedures; 2. Access controls with secure data transfers; 3. Threat detection of abnormal and malicious activity at all levels of the ICS infrastructure; 4. Risk management and mitigation; 5. Process sensors security and authentication; and 6. Resolution of key security problems that requires intrinsic relationship with vendors. Courtesy: MG Strategy+, Control Engineering
Read More

Six critical components of integrated cybersecurity for industrial control systems (ICS)

Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Read More

Securing the ICS: Measure solution effectiveness, maturity

elliTek's IIoTA MES Gateway Appliance. Courtesy: elliTek
Read More

Cybersecurity and IT/OT convergence: How important is your data?

Courtesy: Brett Sayles
Read More

NERC CIP checklist for identification and categorization of BES cyber assets

Read More

How serial-to-Ethernet converters help attackers breach cyber-physical assets

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More

An overlooked ICS cybersecurity gap for companies

Image courtesy: Brett Sayles
Read More

Improve legacy critical infrastructure protection

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT