Connect with us

Hi, what are you looking for?

Tech & Science

Steps for building a vigilant and proactive approach to cybersecurity

Social engineering tactics remain strong and organizations need to take a proactive approach to preventing attacks.

5G image: — © AFP
5G image: — © AFP

It has been ten years since the Target data breach that impacted over 40 million customers — and cost Target $18.5 million in settlements. However, security and business professionals still have lessons to learn when it comes to data protection.

Theresa Lanowitz, former Gartner analyst and Head of Evangelism at AT&T Cybersecurity, explains to Digital Journal how, even in the age of AI and technology advancements, the threat landscape continues to evolve rapidly and requires a vigilant and proactive approach to even the most (seemingly) basic security protocols.

Lanowitz observes that “Data breaches still exist. Adversaries still get tremendous value from seemingly simple things such as name, address, email, contact lists, etc. This data can be used to validate a person against other accounts with valuable information such as financial or medical.”

Of the different attack modes, attempting to impersonate another for financial, political, or power gains is a common fraud. Lanowitz  fears that in “the digital age makes fraud with breached data easier to weaponize. It may seem trite, but cybersecurity hygiene goes a long way to thwart attacks.”

This manifests as: “With each new cybersecurity incident, there is an attempt to put more guardrails around how businesses conduct themselves, how data is handled, and how targets of a breach need to be treated.”

One way to strengthen control is through regulations: “Collectively we have seen new regulations implemented regarding timeframes for notifications of breaches.”

There are other measures to adopt, Lanowitz explains: “The addition of cybersecurity controls and tooling is also something that is a necessity in today’s complex world. Utilizing trusted third-parties such as cybersecurity consultants to act as a strategic partner, managed security services to act as an extended member of the team, or global systems integrators who evolve best practices are recommended.”

Drawing on an example, Lanowitz puts forward: “In the 2023 AT&T Cybersecurity Insights Report, 71 percent of global survey respondents say they work with a trusted third-party once a use case is put in production. Being able to drive operational efficiency within the allocated cybersecurity budget is recommended. Operational efficiency can be achieved by engaging with a managed security services provider.”

Drawing from this, Lanowitz raises: “Social engineering tactics remain strong and organizations need to take a proactive approach to preventing attacks such as account takeover, business email compromise, and personal information exfiltration.”

Lanowitz’s final point is that people need to be careful about how much data they provide to companies. They find: “Living in a digital world comes with convenience as well as risks. When turning your data over to a company, both publicly (social media) or privately (financial) you should ask yourself the level of risk you are willing to accept if there is a breach. In many cases turning over digital proof of who you are is a necessity for things such as obtaining a home loan, enrolling in a government-run travel program, or obtaining a credit card.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

Financial AI could be used for something other than destroying the world.  

Business

Asian markets stumbled out of the gates Monday, extending last week's grim start to the year.

World

Palestinian villager Ghadeer al-Atrash in front of her bulldozed home in Al-Walaja - Copyright AFP INDRANIL MUKHERJEEAnuj CHOPRADabbing away tears, Ghadeer al-Atrash stood before...

World

Britain's embassy in Beijing directed an AFP request to comment to the Foreign Office in London - Copyright AFP Indranil MUKHERJEEChina’s spy agency said...