What Is a Browser Hijacker?
A browser hijacker is a type of malware that infects an internet browser. When your Internet browser becomes infected, it’s done without your knowledge or consent so you may not even notice it’s there until it’s...
During times of upheaval, it’s easy for cybersecurity to get lost in the fray, but cybersecurity is a fundamental part of business continuity. Additionally, cybercriminals take advantage of major events to launch cyber attacks, hoping that information technology and security teams are overworked or distracted.
Here are 5 tips to keep your enterprise secure during times of uncertainty.
It is important that employees report actual or suspected cybersecurity incidents promptly so that your security team can investigate, identify, and address them. Make sure that all employees know exactly who to contact and how, and that they are aware of emergency procedures to perform on their end, such as disconnecting devices. On the response end, make sure that all members of your security team know exactly what they should be doing once an incident is reported.
Organizations need to prepare for a significant uptick in phishing attempts by email, phone, and text message. Make sure to scan inbound emails for threats and unknown file types, and add
suspicious emails to a blocked or spam list. Advise employees to ignore any emails, phone calls, or text messages instructing them to provide their login credentials, click on unknown links, or send money, gift certificates, or other forms of payment.
Make sure to have remote backup files of all critical systems and databases so that they can be restored in the event of a catastrophic loss, whether it occurs due to a cyber attack, a natural disaster such as a hurricane or fire, or negligence or maliciousness on the part of a company insider.
Manufacturer updates for operating systems, software, and firmware often contain critical security updates that address known vulnerabilities, and not installing them leaves organizations open to cyber attacks that take advantage of those vulnerabilities. For example, the Equifax cyber attack was traced back to an unpatched version of Adobe Struts. When updates are released, install them as soon as possible.
The overwhelming majority of successful cyber attacks are due to stolen or compromised passwords. Make sure your employees are using strong passwords for all of their work accounts, are not reusing passwords, and are using Multi-Factor Authentication (MFA) on all websites, applications, and systems that support it. If you’re not doing so already, deploy a robust password manager such as Keeper, which will give you visibility into employee password practices and allow you to enforce policies.
Keeper is an essential component of any remote work technology stack. Using Keeper, employees can easily and securely access all of their work accounts and apps and share data with co-workers. Keeper works from any location and on any device, eliminating the need for employees to keep track of multiple passwords and freeing IT staff from having to reset lost or forgotten passwords.