Anti-virus programs aren't enough • Blisstech Solutions

Today, many business owners install an antivirus program as their single line of defence and call it a day. However, there are many ways to get into a network that circumvents anti-virus.

Hackers are creating malware faster than anti-virus programs can recognise them (about 100,000 new threats are released daily), and professional cybercriminals test their creations against all commercially available platforms before releasing them.

Even if you had a perfect anti-virus program that could detect and stop every single threat, there are many attacks that circumvent anti-virus programs entirely. For example, if a hacker can convince a user to reveal their password using social engineering and install a legitimate remote access tool via a waterholing attack, anti-virus is not going to save you when they remote into your business and get to work.

There are several vulnerabilities a hacker can target: the physical layer, the human layer, the network layer, and the mobile layer. You need a defence plan that will allow you to quickly notice and respond to breaches at each level.  Network and mobile layer protections are well known, but you may not be familiar with the layers and how to protect them.

Physical Layer

The physical layer refers to the computers and devices that you have in your office. It is exploited surprisingly often. However, it is the easiest to defend.

Here are a few examples:keyboard in chains

  • In 2015, 60% of California businesses reported a stolen smartphone and 43% reported losing a tablet with sensitive information.
  • The breaches perpetrated by Chelsea Manning and Edward Snowden occurred because they were able to access devices with sensitive information.
  • As an experiment, Comptia left 200 USB devices in front of various public spaces across the country to see if people would pick a strange device and insert it into their work or personal computers. 17% of consumers fell for it.

For the physical layer:

Keep all computers and devices under the supervision of an employee or secured at all times.
Only let authorised employees use your devices.
Do not plug in any unknown USB devices.
Destroy obsolete hard drives before throwing them out.
In short, taking responsibility for data security involves a lot more than just a software program.

Human Layer

Humans are the weakest link for cybersecurity. A hacker only needs to find one poorly informed, curious or careless employee and they potentially have the keys to your businesses IT.  Some of the techniques employed by the hacker are social engineering, phishing and waterholing and all are designed to trick a user into doing something they shouldn’t.   Some examples of famous security breaches that were results of the human layer are:

  • In 2011 the security company RSA was hacked which was just the starting point that led to the attack against the ultimate target, Lockheed Martin.  The attack started with an Excel document, sent to a small group of RSA employees, via email, which contained a malicious code which opened a backdoor for the hackers.
  • Sony was famously hacked in 2014. Thousands of files, including business agreements, financial documents and employees’ information, were stolen. They were targeted by a spear-phishing attack which looked like emails from Apple.
  • In 2016 the Democratic National Committee was hacked which famously led to emails being published on Wikileaks.   The hackers used spear-phishing with an email, that looked just like it had been sent by Google, requesting that the user reset their password due to malicious activity.  This tricked the user into entering their password, giving the hackers access to their email accounts.

Protection for the human layer comes down to training and education.  Following the training, you need to keep users on their toes and there are services available that will send users fake phishing emails and report who clicked on things they shouldn’t have.  Don’t get hacked because of PEBKAC. Educate and empower your users to be your first line of defence!

Learn more about how Blisstech Solutions cyber-security services can help. Contact us at 01299 382 321 or [email protected].

More Content

Tech Tip: How to name cells in Excel

Welcome to a new Tuesday tech tip video where I will show you how to name cells in Microsoft Excel. Naming cells can make your spreadsheets easier to understand and maintain and help you write more concise and efficient formulas. In the video, I show one way of doing...
Are your employees your security’s weakest link?

Are your employees your security’s weakest link?

Great employees have the same goals you do. But while they’re working hard to help your business succeed, they could accidentally be opening the door to cyber criminals. Here’s how to make your team your business’s strongest defence…

How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

You’ve probably heard a lot of talk about cyber attacks but how worried should you really be? Well, very, because cyber criminals are getting smarter. We have good news to share about how you can protect your business

Microsoft hints at some exciting Windows 12 developments

Windows 11 still feels like a new toy, yet we’ve already heard speculation about Windows 12 arriving as soon as next year. It’s all we can think about!

Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft’s enforcing an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.

Tech Tip: How to align in objects in Microsoft PowerPoint

In today's Tuesday's Two Minute Tech Tip Matt shows you how to align objects in PowerPoint. It can be a pain when trying to align things manually in PowerPoint, but there is a handy little feature that makes this easy. This video will show you how to: 👉 How to quickly...
Here’s what’s in store for the last ever Windows ‘Moments’ update

Here’s what’s in store for the last ever Windows ‘Moments’ update

Microsoft will start to roll out its last Windows 11 ‘Moments’ update in a few weeks. After that it’s back to annual updates. We have all the details of the ‘Moments 5’ features you won’t want to miss. .

What does the global chip shortage mean for your business?

For the past couple of years, the tech world has been struggling with a global chip shortage. But it’s not just tech businesses that are feeling the impact. So many of the things we use every day contain a chip. Laptops and desktops, sure. But also household...

That long password isn’t keeping you better protected

Even passwords of 15 characters can be cracked by cyber criminals. Our latest tech update explains what to do instead

Secure your data under lock and key

Your business's data is invaluable. Without it, you wouldn’t have much of a business, would you? So that data must be kept safe… and one of the best ways to do that is to encrypt it. That way, even if a cybercriminal gets their hands on it, your data is worthless to...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05