See Yourself in Cyber
When you read this title maybe you think of yourself “I know nothing about computers.” Or, perhaps you think, “I’m already in the cybersecurity field!”. No matter where you fall, this newsletter is for you. Why? Every one of us has a part to play in the cybersecurity landscape of the world. If you own a piece of technology, you have a part to play. If you’re a business owner, you have a part to play, and if you’re in the cybersecurity field, you have a part to play. Let’s break these roles down and discuss why it’s so important to see yourself in cyber, and for each of us to be involved.
Individual/Consumer
Most people in the US today own or utilize some form of technology. From smartphones to PC’s, baby monitors to cameras, the devices and uses are endless. As a consumer, you play an important role in cybersecurity, even if it doesn’t feel like it. It is us, the individuals and consumers, who are targeted with various phishing, vishing, even SMiShing attacks on a day-to-day basis. Our place in cybersecurity starts with taking basic steps to protect our online information and privacy. What if you don’t know where to start? The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) provide 4 key actions that everyone should take:
- Enable Multi-Factor Authentication
- Use Strong Passwords
- Recognize and Report Phishing
- Update Your Software
If you’re feeling overwhelmed, you can start by checking out the articles linked in each of the above steps. These are great places to get some more basic information on each of the above tips. We also recommend utilizing a password manager to help with ensuring you have unique, strong passwords for each service you use.
Vendors and Suppliers
If you or your company fall into the vendor or supplier’s category, it’s vital that you understand your role in cybersecurity. Many attackers impersonate vendors in their attacks. Because of this, your company may be a prime target for these attackers. It’s important, then, to understand the steps you can take to secure your sensitive information. To start, be sure to follow the 4 steps outlined above.
Additionally, you need to be aware of what information is available online about your company. Public details, such as client names, vendors, and more, could be utilized in an attack against you or others, so awareness is the first step. Following awareness, educating yourself and your employees about cyber-attacks is key.
Critical Infrastructure Owners and Operators
Critical infrastructure owners and operators play a huge part in ensuring cybersecurity for the larger ecosystem. Ensuring that you follow all the previous tips, let’s take a deeper dive into one; educating your employees.
Education is key in protecting your assets. Employees need to be tested as part of a robust security awareness program. Programs like these are intrinsic to the survival and longevity of your company. There is no better way for your employees to be able to recognize malicious attacks than by seeing them in a safe testing environment where they are encouraged to learn. To get a clear understanding of what these programs look like, please read our case studies here.
Can You Play a Bigger Part?
Clearly, we all play a part in cybersecurity. It’s true that some have a bigger part than others. What about you? Where do you fall? Have you thought about playing a bigger part? Cybersecurity experts are needed now more than ever. If you’re a student, think about taking a cybersecurity class. If you are looking for a new job, consider cybersecurity as an option. Take the time to find out if this is the career field for you. Either way, we must all work together to raise our defenses.
Written by: Shelby Dacko
At Social Engineer LLC, our purpose is to bring education and awareness to all users of technology. For a detailed list of our services and how we can help you achieve your information/cybersecurity goals please visit:
https://www.Social-Engineer.com/Managed-Services/.
*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by Social-Engineer. Read the original post at: https://www.social-engineer.org/newsletter/see-yourself-in-cyber/