This website uses cookies on its adverts and sponsored links. By clicking the "Accept" button you are consenting to their use.

Read more

Accept


Mobile Tech Tracker
≡ sections
Home

Tech Advice

Tech Thoughts

Apps

Tech News

About

Welcome to Mobile Tech Tracker. Our mission is to help technically-minded people to become better versions of themselves and to help ordinary people to use modern smart technologies to their own advantage. If you want to support us, please consider visiting the pages of our advertisers.


The best cyber security practice that isn't popular

Major cyber attacks are featured in the global news with ever-increasing frequency and, according to many cyber security experts, 2017 was, by far, the worst year for large-scale cyber attacks. This trend has created the necessity for pro-active threat detection. Unfortunately, many C-level executives are still not on board with this idea and would rather save some money than adopt any of these practices.

By far, pro-active real-time asset monitoring done by professional threat hunters with an aid of analytical software is the best way of minimising the risk of cyber attacks. The practice encompasses whole range of methods, such as scanning the networks for any open ports, detecting unusual activity patterns and assessing how secure the endpoints are. Even gaining unauthorised access via social engineering, something that was completely undefendable against by security professionals in the past, can be detected by threat hunters who are sufficiently skilled.

Despite its undoubted effectiveness, many large multinational organisations still don't treat pro-active cyber threat hunting as a priority. The reasoning of top-level executives is that, most of the time, there will be no attempted cyber attacks on the system that lower level cyber security professionals or even humble system administrators would not be able to defend against, so highly-skilled and highly-paid threat hunters would be a waste of money most of the time. Unfortunately, cyber attacks are getting much more sophisticated. Therefore, while the idea that pro-active threat hunting is just a nice-to-have luxury rather than a necessity prevails, we will see more articles on the news about major data breaches.

While the frequency of cyber attacks on large organisations is not going down, the best practice from the user's perspective is to only ever share the least amount of information possible. Whenever you will need to fill a web-based form, ask yourself whether doing so is absolutely essential for the quality of your life. Can you achieve what you are aiming at without filling this form? If you have decided to go ahead and supply your details, it would be a good idea to leave any optional fields blank. The organisation that asked for your details may be totally trustworthy and committed to keeping your data safe. However, it may be run by one of those stubborn CEOs that insists on saving money by cutting corners on cyber security. In this case, despite the best intentions of the organisation itself, it is only a matter of time before someone gains malicious access to your data.



For more information, follow this link:

https://goo.gl/UPBsBj


Published by

Posted on 20 Jan 2018




Tech News


.NET Core 3 will not run on .NET Framework

.NET Core 3 will not run on .NET Framework


.NET Core is set to replace .NET Framework

.NET Core is set to replace .NET Framework


If .NET Core is good enough for Bing, it's good enough

If .NET Core is good enough for Bing, it's good enough


Why does Google want to know my location

Why does Google want to know my location


Q#, an emerging language for quantum computing

Q#, an emerging language for quantum computing


Share this:

Facebook Google LinkedIn Twitter Become a Patron!


More from Tech News


.NET Core 3 will not run on .NET Framework [VIDEO]


.NET Core is set to replace .NET Framework [VIDEO]


If .NET Core is good enough for Bing, it's good enough [VIDEO]


Why does Google want to know my location [VIDEO]


Q#, an emerging language for quantum computing [VIDEO]


Edge browser gets improved WebAssembly support [VIDEO]


Kubernetes gets fully integrated with Visual Studio [VIDEO]


Microsoft deploys an underwater data centre [VIDEO]


Microsoft grants organisations an easy access to blockchain [VIDEO]


Saving your mobile apps from the danger of rooted devices [VIDEO]

Privacy Policy

© Mobile Tech Tracker. All rights reserved. Unauthorised copying of any of this website's content is prohibited under international law.

For any queries, comments or suggestions, please write to info@mobiletechtracker.co.uk.