{"id":3498,"date":"2019-05-22T07:10:14","date_gmt":"2019-05-22T05:10:14","guid":{"rendered":"https:\/\/www.msb365.blog\/?p=3498"},"modified":"2019-05-22T07:10:14","modified_gmt":"2019-05-22T05:10:14","slug":"hacking-employees","status":"publish","type":"post","link":"https:\/\/www.msb365.blog\/?p=3498","title":{"rendered":"Part three &#8211; How to secure the number two hacking Target \u2013 our employees\u2026"},"content":{"rendered":"<p>The last part of my trilogy is about the weakest link, our employees. Some of the things you will read in this article, you already know from one of the previous two articles.<\/p>\n<p>When I write that our employees are the weakest link in a security concept we do not have to take this personally. It is a simple and hard fact.<\/p>\n<p>In one of the previous articles, I wrote that mostly small businesses are prime targets for hackers. One of the main reasons for this is, that these companies cannot invest so much in their security and security trainings for employees. These small businesses may have other focuses in their daily business and the IT is just a tool for them. They may have not the budget and\/or knowledge to invest in user restriction policies like bigger companies have. That makes it easier for hackers to run an attack against these employees. For example, a missing permission management can make it easier to get key information of the company, which the attackers can sell, delete or encrypt.<\/p>\n<p>\u00a0<\/p>\n<h2>Phishing weather<\/h2>\n<p>\u00a0<\/p>\n<p>There are reports out there, which prove that employees without training become more sensitized about how important it is to be suspiciously about the different attacks like phishing etc. they may even don\u2019t know if they get fished.<\/p>\n<p>That leaves your company\u2019s sensitive data vulnerable to theft and ransomware attacks, which threatens to delete your data if you don\u2019t pay the hackers.<\/p>\n<p>The official report below shows us, why we need to train our employees. With recurrently trainings we can decrease the damage to our infrastructure.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-3536\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1.png\" alt=\"\" width=\"501\" height=\"361\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1.png 1945w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1-300x216.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1-768x553.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1-1024x738.png 1024w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1-600x432.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1-1600x1152.png 1600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-1-905x652.png 905w\" sizes=\"(max-width: 501px) 100vw, 501px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>This statistic shows us clear that next to social engineering, phishing attacks are the most common method for hackers to get into your organization. If we have a look on the numbers, we see fast, that 96% of phishing attacks are coming through E-Mail.<\/p>\n<p>If we have a look on the official statistics and my own experience as a Messaging Engineer shows that near to 80% of people do not click a single phishing email all year. However, on average, 4% of employees in any given phishing campaign will click it.<\/p>\n<p>A Hacker needs to fool only one victim to access an organization\u2019s network and data.<\/p>\n<p>As we can see in the statistic below, there are many malicious E-Mails out there:<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-3537\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2.png\" alt=\"\" width=\"500\" height=\"452\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2.png 2121w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2-300x271.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2-768x694.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2-1024x926.png 1024w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2-600x543.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2-1600x1447.png 1600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-2-905x818.png 905w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2>Another black cloud<\/h2>\n<p>\u00a0<\/p>\n<p>If an employee got fished, the company can face another problem as well. Here we don\u2019t talk just about the access an attacker gets to the companies network. We talk about ransomware. Cybersecurity experts reported that most ransomware programs are unleashed after employees fall for phishing or social engineering attacks.<\/p>\n<p>If we count all known attacks where ransomware was unleashed as 100%, we will get the following statistic:<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-3538\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3.png\" alt=\"\" width=\"500\" height=\"360\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3.png 1945w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3-300x216.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3-768x553.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3-1024x737.png 1024w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3-600x432.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3-1600x1152.png 1600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2019\/05\/part-tree-3-905x651.png 905w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>At the moment less than 30% of surveyed businesses were confident that their employees could detect risky links or spoofed websites that could lead to a ransomware attack.<\/p>\n<p>\u00a0<\/p>\n<h2>Conclusion<\/h2>\n<p>\u00a0<\/p>\n<p>Our employees are the heart of your company\u2019s IT security. Care about them and they will care about the company. Train them with a few simple tips they can improve their perception about your business\u2019s IT security.<\/p>\n<p>These are:<\/p>\n<ul>\n<li>Train employees to recognize phishing E-Mails and have a process to report them.<\/li>\n<li>Use antivirus software.<\/li>\n<li>Limit employee access to your company\u2019s data.<\/li>\n<li>Implement a permission concept (use different accounts for different things)<\/li>\n<li>User Jumphosts<\/li>\n<li>Update software applications regularly<\/li>\n<li>Use where ever possible, multi factor authentication (MFA)<\/li>\n<li>Implement strong password policies<\/li>\n<li>Encrypt E-Mails, Mobile Devices, USB Sticks, etc<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The last part of my trilogy is about the weakest link, our employees. Some of the things you will read in this article, you already know from one of the previous two articles. When I write that our employees are the weakest link in a security concept we do not have to take this personally. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3518,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[42],"tags":[],"class_list":["post-3498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-varia"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/3498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3498"}],"version-history":[{"count":14,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/3498\/revisions"}],"predecessor-version":[{"id":3551,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/3498\/revisions\/3551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/media\/3518"}],"wp:attachment":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}