By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Cybersecurity hygiene key to keeping cyber threats at bay, say experts
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Cybersecurity hygiene key to keeping cyber threats at bay, say experts
EnterpriseInternetSoftware

Cybersecurity hygiene key to keeping cyber threats at bay, say experts

Grace Chng
Last updated: September 22, 2020 at 6:33 PM
Grace Chng
Published: September 22, 2020
5 Min Read
SHARE
PHOTO: Pexels

Throughout the world, phishing, ransomware and other types of cybersecurity attacks have risen as fast as the spread of coronavirus infection.

On top of securing networks, cloud services and office devices, organisations must continually emphasise security hygiene, said Mark du Plessis, managing director of Accenture Security.

User awareness of security hygiene is often forgotten. A lot of attention needs to be placed now on reminding the workforce on home user IT policies, such as not using unauthorised USB drives on office laptops and locking home networks with passwords, he said in an exclusive interview with Techgoondu.

Whether it is work or personal devices, anti-virus in laptops must also be installed. Basic passwords ought to be replaced with more complex ones.

“And don’t accept calls from people talking about Covid, they are likely to be scams,” warned du Plessis.

Security hygiene is important because of phishing attacks which allows an attacker to masquerade as a trusted entity to steal information. It is a common and effective attack because it masquerades as e-mail from a trusted entity.

Unsuspecting workers can be tricked into opening the e-mail, releasing malware which then surreptitiously trawls the network to steal credentials like passwords and login addresses.

“Phishing is the route of all evil. Once the malware gets into the network, they lay low and wait. They sniff the network traffic and get on to the workers’ laptops,” said du Plessis.

“They look for the local user administrators, cracking their passwords to infiltrate the rest of the network,” he added. “They are really prevalent and user education is a way to combat phishing.”

Various reports from other tech and security companies have also pointed out to the increase in cyber risks and hike in cyber attacks during Covid-19.

In a recent webinar, IBM highlighted that a bank in Egypt had to strengthen its network because staff had to access e-mail on their phones to reach 10 million customers. Otherwise, the network would have presented a big surface for illegal intrusions.

Recognising the cyber risks is only the start, organisations and the workforce must understand the implications for better protection, said Professor Lam Kwok Yan of Nanyang Technological University.

He highlighted in a EY Cybersecurity webcast last week that “phishing is on the rise and it has the potential to hamper public confidence in trusted e-services such as e-government and e-banking”. 

Organisations are now cognisant of these risks. du Plessis observed that in the last five to six months, organisations have increased their security budgets as part of their efforts to manage the Covid-19 health crisis. “Budgets that weren’t there before are there now,” he said.

Organisations are introducing VPNs and multi-factor authentication for secure access to corporate networks, he noted. They are also moving their workloads to the cloud which can implement zero trust at scale, he added.

Zero Trust is a network security model, based on maintaining strict access controls and not trusting anyone by default.

Going forward, organisations must identify and protect their crown jewels, said du Plessis.

They can do this by monitoring the network traffic because unusual patterns often signal illegal activity, he advised. “Pay attention to what is going to and fro in the network, that’s where the attacks will emerge.”

Experts in general advise that organisations should also patch their VPNs which have known vulnerabilities. Besides, attackers often use VPN as a way to export stolen information, they note. 

However, VPNs are always in use and cannot be shut down easily. du Plessis’ advice: power the networks down for a short time, except for the critical infrastructure that needs to run. Then the VPNs can be patched. 

Windows 10 features on the Mac with Parallels Desktop 11
Almost 3/4 of Singapore organisations hit with public cloud cybersecurity incidents: Sophos
Connecting directly to the cloud makes SD-WAN attractive to enterprises
Companies embarking on digital transformation are open to outages, so data protection is crucial
World’s premier cycling event, Tour de France, goes virtual
TAGGED:AccenturecybersecurityEYIBMVPNZero Trust

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByGrace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article Goondu review: Arlo Essential camera taps on your home Wi-Fi easily
Next Article Goondu review: Asus ROG Phone 3 packs in serious hardware
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?