Categories
Industry Insights IT Solutions Managed IT Services

Remote Workers Are Not Protected from Phishing and Vishing

Work from home and remote work is now the new norm however organizations must be aware that remote workers are not protected from phishing and vishing threats.

Phishing is well known but now mix that in with remote workforce, video conferencing apps, and corporate messaging.  The end result is now vishing.

Why are cyber criminals looking at vishing as the new cyber security threat? A few simple points.

Remote workers are not protected from phishing and vishing for the following reasons:

  • Increased use of personal computers by organizations with no Mobile device management (MDM)
  • Increased us of smart phones to conduct our work remotely once again with no Mobile device management (MDM)
  • Increase in phishing emails and vishing calls targeting remote workers

The pandemic had everyone scrambling to find ways for remote workers to work from home, but it did not stop cybercriminal hackers from attacking.

Hackers shifted their techniques to target remote work force at home that lost all the cyber security protection implemented by their managed IT services provider or internal IT department.

This introduced pressure on cyber security systems, policies, and procedures.  Cyber security education was one of the quickest ways to educate and protect organizations.

Remote workers are not protected from phishing and vishing but how do you protect them?

Here are some industry recommendations from cybersecurity specialists and managed security services providers.

  1. Employee education and cyber security awareness.
  2. Show your employees examples of phishing prevention and proven verification tips.
  3. Give examples of suspicious file attachments, malicious website URLs, and good user credential behavior.
  4. Ensure all your systems have updated and managed for the latest vulnerabilities, patches, and security software such as next-gen anti-virus.

When it comes to vishing prevention and verification tips, . these are not well known but there are still some basic cyber security approaches that can be used including:

  1. Inquiry for their name to look-up in the company directory
  2. Inquiry Asking for internal company information to verify their knowledge
  3. Request a call back number to verify where they are calling from
  4. Request for their supervisor’s name to look-up in the company directory

Have Your Passwords Been Stolen in a Data Breach? Try our free data breach scan today and start protecting yourself from cybercriminals.

Going to the cloud or worried about security?  We are your leading Cloud Services Providers Toronto and Managed Security Services Toronto.

365 iT SOLUTIONS  is Toronto’s leading IT consulting boutique firm offering industry leading IT solutions including Managed IT ServicesManaged Security ServicesIT Support ServicesIT Outsourcing ServicesTech Support ServicesCloud ServicesBusiness continuity and disaster recovery (BCDR), and Cyber Security Training and Dark Web Monitoring.

 

We Make IT Simple!

Categories
Industry Insights IT Solutions Managed IT Services

Technology is Making Cybersecurity Fail

As organizations look to improve their cybersecurity measures from hackers, technology is making cybersecurity fail and creating a large problem.

According to recent security research, the cybersecurity industry is offering product and services that may be ineffective in the continued fight against cybersecurity and reducing cyber security crime.

In the survey, they interviewed over 100 technology professionals including cybersecurity leaders from many different industries including enterprises, manufacturers, vendors, government agencies, industry associations and regulators.

Here are some key points on the information from the report:

  • Approximately 90 percent ants reported that cybersecurity technology is not as effective to protect from cyber risk.
  • Many respondents do not have trust in technology being delivered to protect their organization.
  • Organizations did not have a common definition when evaluating cybersecurity technology performance.
  • Over 92 percent of participants reported no partnership in the market with cybersecurity vendors.
  • Very low number use an independent cybersecurity assessment partner and conduct all IT security assessments internally.
  • Approximately 70 percent of respondents feel that, and independent cybersecurity assessment of technology would help solve their IT security issue and define what cybersecurity technology is required.

Is technology is making cybersecurity fail? Yes, but there is a catch.

In no way does this mean your organization does not need cybersecurity measures such as next-gen firewalls, next-gen antivirus with built-in AI, security appliances and services.

Organizations need to evaluate and plan accordingly to ensure they have the best chance at reducing their cybersecurity exposure.  Employees are the key factor to protecting your infrastructure.

Some organizations may see people as the largest security vulnerability however with the right cybersecurity training, they can be more effective to protect your business from hackers.

Have Your Passwords Been Stolen in a Data Breach? Try our free data breach scan today and start protecting yourself from cybercriminals.

Going to the cloud or worried about security?  We are your leading Cloud Services Providers Toronto and Managed Security Services Toronto.

365 iT SOLUTIONS  is Toronto’s leading IT consulting boutique firm offering industry leading IT solutions including Managed IT ServicesManaged Security ServicesIT Support ServicesIT Outsourcing ServicesTech Support ServicesCloud ServicesBusiness continuity and disaster recovery (BCDR), and Cyber Security Training and Dark Web Monitoring.

We Make IT Simple!