This website uses cookies on its adverts and sponsored links. By clicking the "Accept" button you are consenting to their use.

Read more

Accept


MobileTechTracker
≡ sections
Home

Apps

TrackerBlog

GeekHub

Tech News

About

Welcome to Mobile Tech Tracker. Our mission is to help technically-minded people to become better versions of themselves and to help ordinary people to use modern smart technologies to their own advantage.


The best cyber security practice that isn't popular

Major cyber attacks are featured in the global news with ever-increasing frequency and, according to many cyber security experts, 2017 was, by far, the worst year for large-scale cyber attacks. This trend has created the necessity for pro-active threat detection. Unfortunately, many C-level executives are still not on board with this idea and would rather save some money than adopt any of these practices.

By far, pro-active real-time asset monitoring done by professional threat hunters with an aid of analytical software is the best way of minimising the risk of cyber attacks. The practice encompasses whole range of methods, such as scanning the networks for any open ports, detecting unusual activity patterns and assessing how secure the endpoints are. Even gaining unauthorised access via social engineering, something that was completely undefendable against by security professionals in the past, can be detected by threat hunters who are sufficiently skilled.

Despite its undoubted effectiveness, many large multinational organisations still don't treat pro-active cyber threat hunting as a priority. The reasoning of top-level executives is that, most of the time, there will be no attempted cyber attacks on the system that lower level cyber security professionals or even humble system administrators would not be able to defend against, so highly-skilled and highly-paid threat hunters would be a waste of money most of the time. Unfortunately, cyber attacks are getting much more sophisticated. Therefore, while the idea that pro-active threat hunting is just a nice-to-have luxury rather than a necessity prevails, we will see more articles on the news about major data breaches.

While the frequency of cyber attacks on large organisations is not going down, the best practice from the user's perspective is to only ever share the least amount of information possible. Whenever you will need to fill a web-based form, ask yourself whether doing so is absolutely essential for the quality of your life. Can you achieve what you are aiming at without filling this form? If you have decided to go ahead and supply your details, it would be a good idea to leave any optional fields blank. The organisation that asked for your details may be totally trustworthy and committed to keeping your data safe. However, it may be run by one of those stubborn CEOs that insists on saving money by cutting corners on cyber security. In this case, despite the best intentions of the organisation itself, it is only a matter of time before someone gains malicious access to your data.



For more information, follow this link:

https://goo.gl/UPBsBj


Published by

Posted on 20 Jan 2018


Comments (0)

Author's Name *

Email *

5 + 3 *

Comment

*


Tech News


Microsoft is killing off its mobile operating system

Microsoft is killing off its mobile operating system


Widely ignored Facebook rule is officially illegal

Widely ignored Facebook rule is officially illegal


The biggest danger coming from the internet

The biggest danger coming from the internet


Google is sued for discriminating against white conservative men

Google is sued for discriminating against white conservative men


2017 was the worst year for cyber attacks and IT glitches

2017 was the worst year for cyber attacks and IT glitches


Share this:

Facebook Google LinkedIn Twitter Become a Patron!


More from Tech News


Microsoft is killing off its mobile operating system [VIDEO]


Widely ignored Facebook rule is officially illegal


The biggest danger coming from the internet [VIDEO]


Google is sued for discriminating against white conservative men [VIDEO]


2017 was the worst year for cyber attacks and IT glitches [VIDEO]


Edward Snowden released anti-surveillance app [VIDEO]


Apple confirms enforcing obsolescence [VIDEO]


Cases for and against net neutrality [VIDEO]


Facebook trolls those users who try to use Messenger on a mobile browser


Lucrative market for a 50 year old programming language [VIDEO]

Privacy Policy

© MobileTechTracker. All rights reserved. Unauthorised copying of any of this website's content is prohibited under international law.

For any queries, comments or suggestions, please write to info@mobiletechtracker.co.uk.