Protecting the most vulnerable
Oftentimes, humans are considered the weakest link in the cybersecurity chain, but for Payton, today鈥檚 hyper-connected world is placing us in a vulnerable position.
鈥淎ll technology by design today is designed to be open,鈥 explained Payton. 鈥淚t has Bluetooth, it has WiFi. It鈥檚 technology we all know and love. It鈥檚 part of our daily lives, but because it鈥檚 designed to be open, it is always at risk of being hacked.鈥
For Payton, this means that organizations must design security strategies that create a safety net around the user, helping to limit the impact of a potential hack.
Cybersecurity with humans in mind
Payton鈥檚 first piece of advice is to acknowledge that statistically, it鈥檚 likely that an employee will click a malicious link. In one survey, almost 70 percent of participants were fooled by emails that appeared to be sent from co-workers. As Payton points out, simply asking people to not click links is a battle that has been ongoing for more than 15 years. It鈥檚 safe to assume that someone will click a malicious link at some point.
Operating under this pretense, Payton suggests that retailers (and all organizations) do three things:
1. Create a safety net around users 鈥 By limiting permissions and segmenting systems, retailers can limit the impact of any phishing intrusions. As Payton points out; 鈥淪egmentation doesn鈥檛 have to just be 鈥榤y network is segmented,鈥 or 鈥榤y data is segmented.鈥 It could be the humans and their user access controls are segmented.鈥
2. Employ a virus scanner 鈥 Employees should be required to use a virus scanner before clicking any links. Virus scanners allow employees to copy and paste links, which are then cross-checked against dozens of databases to see if they are malicious.
3. Use a virtual machine 鈥 Set up rules so that all links and attachments open on a sandbox or virtual machine that operates outside of your corporate network. If a malicious link is then clicked, it won鈥檛 be able to reach your critical systems.
听
Want more great insights into how you can merge seamlessness and security while still enabling growth? Watch the full cybersecurity webinar on demand, or download our eBook; “Delivering Multi-Dimensional Fraud Prevention” to find out how 野花社区 ReD Shield keeps fraudsters at bay with multiple layers of control.
听
About Theresa Payton
Theresa Payton is one of America鈥檚 most respected authorities on internet security, data breaches and fraud mitigation. She was the first female to serve as White House chief information officer and was the star of the CBS series Hunted. In 2017, Theresa was named #4 on IFSEC Global鈥檚 list of the world鈥檚 top 50 cybersecurity influencers in security and fire.