Nowadays, security education may be part of an organization’s process, but although many people know not to open an email from an unidentified source, or even those from a friend or coworker that have uncharacteristic links or text, still individuals got tricked and compromised.
It is the main reason behind the organization’s risk. These types of phishing attacks ignites the risk to the organization that must be handled before it get worse.
Ajit Sancheti, CEO and co-founder of Preempt, examines best practices each organization and their users must deploy, both in and out of corporate networks, to minimize malicious threats in inconspicuous (and conspicuous) places.
Ask yourself: is this for work?
Many people have downloaded application and get registered to use their services to modernize their work process. However, many do this using a corporate email addresses and passwords. By re-using logins for third-party apps, employees increase the potential attack surface for corporate access. Many third party apps are not secure enough to rely on giving a reused password.
Reconsider Password Sharing:
Many people distribute their password to their friends and family to give access to the service. However, opening accessibility to other users increases the threat potential dramatically. When sharing passwords with those who may lack security awareness, it no longer becomes a matter of who you trust, but whether they can spot risks and avoid them before it is too late.
Suspend the Access for Employees who Left the Organization:
It may seem obvious that an individual’s access to the system should be suspended when they leave. Make sure managers take accountability for communicating with IT in a timely manner to shut off email and access to other applications and systems to prevent former employees from accessing things they shouldn’t.
Check Identity before Giving Access to Sensitive Data:
Organizations with highly confidential information should take steps to continuously ensure that users accessing it are who they say they are. In addition to username and password, identity verification monitoring should track user activity and initiate additional verification every time user activity looks suspicious. Whereas, implement two way verification or biometric verification as a best practice.
Monitor Privilege Users:
Privileged access means a higher risk of compromising the enterprise network. To keep privileged accounts secure, keep track of privileged accounts and regularly review them to downgrade those with unnecessary privileges and to remove stale accounts.
These are some best practice that can help an organization to defend against the cyber threats and minimize the risks associated with it. However, the cyber risk can’t be eliminated completely, so we should do our best to prevent priory.