Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 3|回復: 0
打印 上一主題 下一主題

IT knowledge is power

[複製鏈接]

1

主題

0

好友

5

積分

新手上路

Rank: 1

該用戶從未簽到

跳轉到指定樓層
樓主
發表於 2024-11-9 15:23:24 |只看該作者 |倒序瀏覽
There are two key factors to consider. The first is the ability of employees to recognize phishing emails, fake websites, and fraudulent calls. Company personnel should be well versed in social engineering techniques – the techniques used by cybercriminals to entice users to open critical information. The second is a clear understanding of what to do and who to contact in the event of a cyber incident.

In addition, company employees need to know what topics they can discuss outside the digital space - even in conversations with people they know well. As well as content writing service rules for using personal devices, including mobile ones, from which they are given access to corporate information. In particular, employees should have clear instructions on what to do if they lose a gadget.

When explaining this information to the staff, it is extremely important to build the communication correctly, to talk about the possible consequences of inappropriate behavior, and not about punishment for it. The employee should not be afraid that he can make a mistake, but imagine the risks and probable losses: the company's and his own.



Of course, such skills need to be developed in all company employees. But there are certain categories that need to be trained first.

First of all, these are older specialists. They are not as deeply immersed in digital technologies as the younger generation, and the IT sphere is not as widely represented in their daily life.

Older employees are more likely to have access to critical data or have job responsibilities that involve particularly sensitive business processes.

This could be, for example, working with financial documents or customer data.

There are known cases when cybercriminals, having obtained access to the mailboxes of such employees using the same social engineering, simply controlled their official correspondence, receiving confidential information about the company's work and relationships with suppliers. Moreover, the result of such control was the interception of a letter with an invoice and the substitution of details in the attached document - as a result, significant funds were transferred to the account of the intruders.

There is a high probability of fraudulent correspondence when encryption viruses are sent to employees' computers via email attachments

Often, victims of such an attack can be employees of the organization who are engaged in monotonous work, processing a large volume of incoming documents. It is difficult for them to identify phishing letters in the general flow. There are especially many such specialists in the accounting or logistics departments of companies.

Top management of organizations in most cases is well aware of the rules of information security. But this does not exclude the possibility of using managers for fraudulent purposes.

In general, it is necessary to develop cyber literacy skills in both managers and their subordinates.

INFORMATION SECURITY CONTROL

The role of information security managers in developing the skills of the company's employees is extremely important. They are not the immediate supervisors of line specialists and should act as a kind of informal leaders who can provide advice and make decisions on issues related to cybersecurity at any time.
回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

雲端vps主機|免費論壇|Archiver|手機版|Comsenz Inc.

GMT+8, 2025-2-7 22:53 , Processed in 0.331037 second(s), 22 queries .

抗攻擊 by GameHost X2.5

© 2001-2012 Comsenz Inc.

回頂部 一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |