Cybersecurity Should Be Extended Beyond the Firewall
retailciooutlook

Cybersecurity Should Be Extended Beyond the Firewall

By: Retail CIO Outlook | Monday, May 13, 2019

Hackers work hard to find new ways of obtaining information. No surprise, for any risk owner, in all industries, that cybersecurity risk is a main priority. Every company should realize that they are always susceptible to an attack, whether it be an external targeted attack and a social engineering attack, as the frequency and complexity of malicious attacks continue to increase.

Cybersecurity includes a range of risks and vulnerabilities for the company, from denial of service distribution (DDoS) attacks to USB phishing. Companies may also be in danger of interactive kiosks or cyber attacks on travel managers.  Phishing, as a confident entity in electronic communication, is a fraudulent attempt to acquire sensitive information as the name of the user, passwords or credit card details. These are some of the most powerful forms of attacks by social engineering. NTT Security has broadened its phishing attack simulation service suite utilizing special social engineering technology to check whether senior managers pose a security risk.

ADT Cybersecurity partners with Cofense for the detection and response of phishing solutions. Cofense Triage is an automated response network for phishing-specific incidents which works as part of ADT's cybersecurity services. The system concentrates on preventing phishing attacks by shifting such attacks into the killing chain before damage can be caused.

     Check out: Top Cyber Security Companies

The unauthorized use of USB ports is also another cybersecurity vulnerability for companies. Cybersecurity should also be extended beyond the firewall, which requires limited access to USB ports of a system as a way of managing' endpoint security.' The blocking of all USB ports can, however, limit productivity and staff should not be as efficient. Kingston provides hardware-based USB hardware that deploys 256-bit XTS-mode AES encryption to make sure that information will not be accessible to anyone.

The interactive control kiosks, which are computer terminals with specialized hardware and software which provide access to information and applications, are another potential cybersecurity vulnerability. Kiosks are typically situated in high traffic settings such as retail stores, hospitals, banks, hotels, and airports.

Traveling managers are considered to be other kinds of vulnerability. The international cybersecurity landscape is becoming ever more dynamic, with threats from government, terrorists, insurgents, and criminals demanding proactive and vigilant travelers. The U.S citizens must be aware of considerations of high-value targets for national intelligence and criminally driven bad actors, particularly for U.S. executives of technology companies.

See Also:  Cyber Security Review magazine 

Weekly Brief

Read Also