As security awareness increases and tools become smarter to help users protect their data, do not let your guard down. The user is still the target and weakest link when it comes to the top threats active in 2022. Hackers use techniques that are designed to trick a user to gain access to additional information to steal data, access systems or to hold company’s hostage.
Here is a list of Intrada’s top 5 security threats you should be aware of:
- Phishing Scams
Phishing is considered one of the most dangerous hacking techniques that uses social engineering. Social engineering threats focus on human error and not technical vulnerability. Hackers want to trick users to click on a link, respond with valuable information or perform a task that can give them direct access to your computer, accounts or data.
According to the Verizon’s Data Breach Investigations report (https://www.verizon.com/about/news/verizon-2021-data-breach-investigations-report), 85% of all data breaches involve human interaction and hackers know it.
Don’t click on links in emails unless you are positive they are from a trusted source. Don’t enter security information on websites you visited from a link that you did not request. And never respond to a phishing scam and hit delete. To learn more about phishing and how to protect yourself, click here.
- Not Keeping your Devices Up to Date
Patching and updates are necessary and should be done regularly. Every software and hardware vendor distributes patches to provide updated features but more importantly security and vulnerability protection. Keep your computer updated with the latest patches. Keep your anti-virus or endpoint detections services updated and keep your phone on the latest versions.
- Malware
Malware is the process of sneaking in dangerous code into a business or home system. This is a direct threat to all types of computer systems and comes in all types and forms. Most malware comes from links in emails, opening attachments, downloading files or installing software on your computer or device. Common forms of malware are viruses, trojans, worms, spyware, ransomware, bots, rootkits and adware.
- Cloud Vulnerability
Cloud Vulnerability is new for 2022 as many companies are making the transition from physical onsite servers to the cloud. Just because you’re moving or are already in the cloud does not mean you are magically protected or secure; it just means you’re using someone else’s servers. These systems still need to be managed, accounts need to be confirmed, security must be monitored, and new procedures implemented to ensure systems are being used correctly. In some cases, it’s more difficult to manage the cloud because it’s a new technology and the options are endless. You need to make sure your accounts have strong passwords, multifactor authentication, archiving and you have a solid backup plan.
- Protecting PII (Personal Identifiable Information)
Personal information is anything that can be used to distinguish one person from another or direct identifiers such as social security numbers, account numbers, passport numbers, addresses, medical information and birth dates. Users need to make every effort to protect PII information when it is stored and sent to other users. Email is not a secure method to send PII without email encryption. Hackers know that PII is valuable; it can be used in other cyber threat methods to increase success rates by providing additional information to trick users or even access data without proper authorization. To learn more about PII, click here.
Intrada can’t stress enough the need to be aware and diligent to the threats that surround the user and the devices we hold in our hand. Don’t let your guard down. If you didn’t expect that email, do you really need to click on it? A burglar can only hit one location at a time; a hacker can hit thousands of users over and over and they wait for someone to take the bait, that hook to pull you in. Don’t take the bait.
Cybersecurity Awareness Poster