Profile cover photo
Profile photo
KILEO. Y
58 followers
58 followers
About
Posts

Post has attachment
Public
KILEO. Y commented on a post on Blogger.
SUGGESTIONS FOR MAKING EMPLOYEES MORE AWARE AND COMPANIES MORE CYBERSECURE:

Make sure remote workers use a virtual private network, or VPN, rather than public Wi-Fi. Many employees and contractors work from coffee shops and libraries as needed, to make use of their public Wi-Fi. However, public Wi-Fi can put internal company data at higher risk. A VPN connection ensures that communications are encrypted, preventing cybercriminals from intercepting them.

Require strong passwords and good password habits. A strong password is your first line of defense against attackers attempting to gain unauthorized access to your data - Passwords should be at least eight to 12 characters long, include letters and numbers, and should not contain commonly used words such as "admin" or your username.. She also recommended using a password manager to store randomly generated passwords, never reusing a password and choosing a unique password for each account to prevent hackers from using one password to breach more than one account.

Urge caution before clicking. Most data breaches arise from social engineering and phishing malware attacks! Phishing files disguised as shopping or banking apps, deployed to steal login or credit card credentials, represented 11 percent of malicious files cleaned from infected sites in the first quarter of 2018.

Warn employees about the dangers of oversharing. sharing too much information through social media, steering clear of surveys that ask for "seemingly innocuous" information, like a pet's name or a first concert, that cybercriminals can use to access accounts.

Limit employee access to company data. It starts with access — knowing who can have access to which of the company's data, e-mail, websites, etc. When onboarding, HR should collect the profile of an employee, including what that person's job description is and what they will have access to. You need to ensure that your systems are safe and secure and that an employee who is not authorized to access the company's financial data can't take that data and send it elsewhere.

Track all devices. HR needs to log each device that every employee has and be able to map each one to a person. It should also be clear who in management can log in remotely to turn off any device they think is being misused.

Limit personal use of work devices. Workers must know that a work device is meant for work and that they shouldn't store personal passwords or photos on the devices, as that information can be viewed by an employer or lost if the device goes missing.

Encourage employees to quickly report their cybermistakes. Thank an employee who admits she clicked a bad link or opened an attachment she shouldn't have. IT needs to know about these things as soon as possible. If you punish her, no employee is going to come forward when they do the same thing. This allows the issue to grow and possibly affect the whole organization.

Require two-factor authentication to log in to company systems.

Train employees regularly. Training should be part of onboarding and should take place annually or semiannually. Guidelines should be readily accessible on the company's internal website.

Make cybersecurity part of offboarding. If you're going to do a layoff or a planned termination, have the tech people lined up and ready to go immediately after termination should a disgruntled employee try to retaliate through a cyberbreach.

Use artificial intelligence-based security monitoring to find irregularities. These systems can identify weaknesses, even down to unusual activity of a single employee.
Add a comment...

Post has attachment
Public
U.S SENATORS URGE FTC TO INVESTIGATE SMART TV PRIVACY CONCERNS
IN BREAF: Two US senators Edward Markey (D-MA) and Richard
Blumenthal (D-CT) have sent a letter to the Federal Trade Commission (FTC) requesting
the agency to investigate smart TV makers amid fears and evidence that
companies might be using devices to colle...
Add a comment...

Post has attachment
Public
Challenges

* Decision-makers who do not consider cyber threats a priority;
* Users not being aware of the potential impact of cyber threats, and hence not doing enough to push their governments to take action;
* Lack of knowledgeable experts in the field of cyber security;
* Lack of collaboration - most nations fight cyber crime individually, forgetting these crimes are borderless; and
* Lack of harmonised cyber laws - so far not all African countries have specific cyber laws in place.
Add a comment...

Post has attachment
Public
security awareness programmes rolled out by the government have not been effective. He has actively participated in a review of the strategy and today communication from government is being targeted primarily at tertiary institutions and the youth.
Add a comment...

Post has attachment
Public
wahalifu mtandao wame endelea kuingilia vifaa hivi kwa nia mbali mbali – Wengine wanafatilia tu familia za watu na njia rahisi ni kupitia vifaa hivi vinavyo weza kudukuliwa kirahisi, na wengine ni katika kukusanya tu taarifa za watoto ambazo wamekua wakizitumia vibaya.
Add a comment...

Post has attachment
Public
NAMNA BORA YA KULINDA VIFAA VYA TEHAMA VYA WATOTO
KWA UFUPI :
Kutokana na ukuaji wa teknolojia pamoja na muunganiko wa vitu vingi katika
mtandao (IoT) vifaa vingi vya watoto vimekua mhanga mkubwa wa uhalifu mtandao –
Hii imepelekea kuchukuliwa kwa hutua mbali mbali za kulinda watoto mitandaoni.
Andiko hili...
Add a comment...

Post has attachment
Public
#Infosec #Cybersecurity - My Interview regarding The rise of #Cybercrimes in Most of African countries and The meeting I attended In South Africa on cybersecurity.
Add a comment...

Post has attachment
Public
We have seen many ransomware attacks facing organisations across the globe - I have given example of recently Ransomware attacks and provide three basics advise on how individual and organisations can fight against ransomware attacks.

- Kileo.
Add a comment...

Post has attachment
Public
RISING SHIELD AGAINST RANSOMWARE ATTACKS
IN BRIEF: Both Atlanta’s network and Roseburg schools suffered
with Ransomware attacks recently. These are two examples among many ransomware
attacks facing organisations across the globe. This writing will provide three
basics advise on how individual and ...
Add a comment...

Post has attachment
Public
Key considerations as we build Digital forensics lab!
Add a comment...
Wait while more posts are being loaded