- 註冊時間
- 2024-11-9
- 最後登錄
- 2024-11-9
- 閱讀權限
- 10
- 積分
- 5
- 精華
- 0
- 帖子
- 1
![Rank: 1](static/image/common/star_level1.gif)
該用戶從未簽到
|
There are two key factors to consider. The first is the ability of employees to recognize phishing emails, fake websites, and fraudulent calls. Company personnel should be well versed in social engineering techniques – the techniques used by cybercriminals to entice users to open critical information. The second is a clear understanding of what to do and who to contact in the event of a cyber incident.
In addition, company employees need to know what topics they can discuss outside the digital space - even in conversations with people they know well. As well as content writing service rules for using personal devices, including mobile ones, from which they are given access to corporate information. In particular, employees should have clear instructions on what to do if they lose a gadget.
When explaining this information to the staff, it is extremely important to build the communication correctly, to talk about the possible consequences of inappropriate behavior, and not about punishment for it. The employee should not be afraid that he can make a mistake, but imagine the risks and probable losses: the company's and his own.
![](https://afbdirectory.com/wp-content/uploads/2024/10/Content-Writing-Service-scaled.jpg)
Of course, such skills need to be developed in all company employees. But there are certain categories that need to be trained first.
First of all, these are older specialists. They are not as deeply immersed in digital technologies as the younger generation, and the IT sphere is not as widely represented in their daily life.
Older employees are more likely to have access to critical data or have job responsibilities that involve particularly sensitive business processes.
This could be, for example, working with financial documents or customer data.
There are known cases when cybercriminals, having obtained access to the mailboxes of such employees using the same social engineering, simply controlled their official correspondence, receiving confidential information about the company's work and relationships with suppliers. Moreover, the result of such control was the interception of a letter with an invoice and the substitution of details in the attached document - as a result, significant funds were transferred to the account of the intruders.
There is a high probability of fraudulent correspondence when encryption viruses are sent to employees' computers via email attachments
Often, victims of such an attack can be employees of the organization who are engaged in monotonous work, processing a large volume of incoming documents. It is difficult for them to identify phishing letters in the general flow. There are especially many such specialists in the accounting or logistics departments of companies.
Top management of organizations in most cases is well aware of the rules of information security. But this does not exclude the possibility of using managers for fraudulent purposes.
In general, it is necessary to develop cyber literacy skills in both managers and their subordinates.
INFORMATION SECURITY CONTROL
The role of information security managers in developing the skills of the company's employees is extremely important. They are not the immediate supervisors of line specialists and should act as a kind of informal leaders who can provide advice and make decisions on issues related to cybersecurity at any time.
|
|