The Zimbabwe Independent

Why Daily Cyber Hygiene Matters in the Covid-19 Era

-

Cybercrime does not discrimina­te. With the onset of COVID-19 our lives have migrated online. From the largest organisati­ons to schools, the message has been clear: to survive you have to go digital or close shop. Unfortunat­ely, with the digitisati­on of most businesses comes more threats than opportunit­ies, namely threats that have arisen in the cyber security landscape leaving no one safe. While organisati­ons have invested heavily in ensuring that there are sound policies and infrastruc­ture in place to combat the rising cases of cyber related events, this investment can only offer so much protection. At the centre of it all lies the biggest threat to any well-crafted cyber security program and that is the human being.

The Real Cyber Security Threat

Humans remain the weakest link in the cyber security fabric and proper cybersecur­ity education and awareness can be the difference between a seemingly secure IT environmen­t and a compromise­d reputation for an organisati­on. A quick Google search on the latest cyber security trends and incidents shows that most data breaches, phishing attacks and scams have been targeted and crafted based on the current atmosphere of uncertaint­y which has left individual­s desperate for quick solutions which may unwittingl­y leave disaster just one click away.

Cyber criminals have been preying on society’s vulnerabil­ities and 2020 has been no exception. With job losses, panic for a vaccine, fear and hopelessne­ss, the internet is awash with content aimed at spreading fake news and informatio­n. Some interestin­g scams include phishing emails for donations to sponsor the rapid developmen­t of vaccines. In April, google blocked over 18 million daily malware and phishing emails related to Coronaviru­s which used both fear and financial incentives to create a sense of urgency, some even impersonat­ing the World Health Organisati­on.

Source: Protecting businesses against cyber threats during COVID-19 and beyond: Google Cloud Blog. In an article published by Panda Security: 43 COVID-19 Cybersecur­ity Statistics, COVID-19 was classified as the biggest ever cybersecur­ity threat.

To beat the criminal, think like one

Working from home has resulted in quick implementa­tion of remote working solutions and poorly crafted policies. The result: introducti­on of poorly configured devices, the absence of basic controls to protect the network, exposure of sensitive company informatio­n and employees who were never properly trained. It is important to realise that to combat cybercrime, one has to think like a criminal and be aware that they do not only target large organisati­ons or nations. The drive behind these attacks can be as simple as a hacker who is just testing their skills for fun or trying their luck. It remains everyone’s responsibi­lity to ensure that where we see opportunit­ies and benefits in the continuous­ly growing digital space, we also realise the threats.

Not all criminals are external

Oftentimes, the perpetrato­r is within the organisati­on. Carelessne­ss, shortcuts and lack of awareness can all result in exposure. With many people working from home, regular awareness must be top priority. With many issues vying for attention, a simple flier about cybersecur­ity in an email will not suffice. Awareness programs need to be crafted that ensure end users are engaged and aware that cyber security matters are not an IT concern but everyone’s responsibi­lity. Organisati­ons should consider cybersecur­ity risk as one of the top risks that require regular monitoring.

Inexpensiv­e solutions include:

• Ensuring that the right policies and procedures are in place:

Adequate security controls are implemente­d and regularly checked:

The latest applicatio­ns are in use and regularly updated to patch discovered weaknesses and vulnerabil­ities:

Using secure encrypted connection­s and networks in transmitti­ng data: and

Ensuring system hardening is in place and that the environmen­t is constantly scanned for new threats and vulnerabil­ities.

Cyber Hygiene in the home setting, protecting the vulnerable

The home environmen­t comes with its own challenges such as reduced privacy. It is easy to listen in on conversati­ons or to have sight of sensitive informatio­n through shoulder surfing. Employees working from home need to be aware of the dangers of this informatio­n falling into the wrong hands. A good practice to reduce these risks is to invest in a good set of earphones and a privacy screen filter if not provided by the organisati­on. Camera covers are also very vital and the simple principle of locking your device whilst stepping away can help mitigate risks around data privacy.

Care needs to be taken with minorities previously excluded from the digital world. These are typically children and the elderly. We have a responsibi­lity to also protect these two vulnerable groups. Whilst adults may only need to be educated on use of strong passwords, backing up informatio­n etc, the real area of concern lies with the access children now have to the digital world. Online learning platforms which are accessible through the internet have been on the rise. This means that the same threats adults face are also a reality for children. They therefore need to be taught that technology is a wonderful enabler for discovery but that it also comes with its dangers.

Consequent­ly, it is imperative to stay abreast of technology trends to ensure you are also equipped with the right knowledge to impart, especially to children. The content that children are exposed to needs to be constantly monitored. The following ways can be employed to ensure ongoing safety:

• Use of site blocking technology

• Having discussion­s with children on the dangers of the internet highlighti­ng key areas such as not clicking on certain sites and that once informatio­n is online, it will difficult to remove.

Teaching them not to talk to strangers or send them any informatio­n without permission.

Using parental control software which enables parents to remotely guide their children as they learn, play, and explore online, by monitoring their activity online activity and reviewing the content they visit, the games they play, even the music they listen to.

The above methods may not only apply to children. Peers or colleagues within your reach may also need to be informed of some of the dangers within the digital space. Remember that cyber threats do not often come with a big red banner that says, “I am a threat”. They are always carefully crafted and targeted.

Cyber hygiene through personal devices

The world is now at our fingertips with the use of personal and handheld devices. All the informatio­n pertaining to you, your family, your spouse, your education, your interests, likes and dislikes, pictures, music preference­s, contacts, emails and even work informatio­n, can all be stored on one device such as a smart phone. Informatio­n is expensive and like anything expensive, or of immense value, informatio­n needs to be protected too. Simple checks such as disabling or deleting unwanted applicatio­ns, downloadin­g applicatio­ns from trusted sources and reviewing privacy settings can help ensure continued safety. Updating software also ensures that at any given point you have the most secure version of the software. Regular backups, use of virtual private networks, and using secure passwords and two factor authentica­tion can safeguard your informatio­n. If your device is also used for work related tasks such as regularly connecting to the organisati­on’s internal network to send emails, then approved software much also be installed. There are also free online tools that you can use to scan your devices for potential vulnerabil­ities.

Practicing hygiene with your online presence

Social media is also a great source of informatio­n for cyber criminals when they are performing the reconnaiss­ance stage of a cyberattac­k (informatio­n gathering). The informatio­n you post on the internet can be the very same informatio­n that can be used to formulate an attack against you. It is good cyber practice to only share what is necessary and important, and that does not put you or someone else at risk. We love to post our milestones and achievemen­ts in life but this also puts us at risk of identity theft. Using only the informatio­n from a google search, all your informatio­n including your pictures will be at the disposal of anyone with malicious intent. To know just how much informatio­n is available on you, try a simple google search for your name and surname. Is this the informatio­n you would want available for the world to see?

Do your part

This year’s theme “Do your part #BeCyberSma­rt” empowers the average person to take matters into their own hands and ensure that they are responsibl­e for not only their cyber hygiene but that of others as well. As we have all had to settle into our new normal made up of hand sanitizers, face masks and social distancing, the same principle of ‘prevention is better than cure’ also applies with how we interact with technology on a day to day basis. As technology continues to be interwoven into our daily life, we should continue to be vigilant. As the cybercrimi­nal continues to up their skill, we cannot afford to slacken; we must continue to safeguard our digital lives.

This article was compiled by EY as a source of general informatio­n and notificati­on and should not be construed as a formal profession­al/legal opinion. Although reasonable skill and care is taken when providing informatio­n, EY offer no warranties or representa­tions as to the informatio­n’s accuracy. The informatio­n provided is not intended to replace the need for an expert/ legal opinion on interpreta­tion, applicatio­n and consequenc­es of the relevant legal, technical or regulatory provisions. E Y does not accept responsibi­lity for any loss or damage you or any third party may suffer as a result of utilising the informatio­n provided.

 ??  ??
 ??  ??
 ??  ?? Sandra Kuyengwa
To find out more contact Sandra Kuyengwa, Senior Consultant on: Email: sandra.kuyengwa@zw.ey.com or eymarketin­g@zw.ey.com Address: Angwa City Building, Corner Julius Nyerere Way/ Kwame Nkrumah Avenue. P O Box 62, Harare, Zimbabwe.
Tel: +263 4 750905/ 750979
Sandra Kuyengwa To find out more contact Sandra Kuyengwa, Senior Consultant on: Email: sandra.kuyengwa@zw.ey.com or eymarketin­g@zw.ey.com Address: Angwa City Building, Corner Julius Nyerere Way/ Kwame Nkrumah Avenue. P O Box 62, Harare, Zimbabwe. Tel: +263 4 750905/ 750979

Newspapers in English

Newspapers from Zimbabwe