The internet is adjudged the appropriate medium through which small businesses sell and promote their goods and services. Unfortunately, it also encourages fraudulent behaviours and unauthorised accesses to businesses and their clients’ data. Frequent attacks on computer systems of businesses can have immediate and remote effects on business activities, such as targeting customers for identity crimes or infecting website visitors with malicious software. Consequently Small scale businesses are known to be reluctant in implementing security measures that may protect their information or data, thus making them vulnerable to existing or emerging threats.

It’s no secret therefore that organizations face a growing array of cyber-security threats. What is more, is the potential impact from malware as a mounting concern. In today’s deteriorating security environment, what is often ignored or overlooked are the roles of employees, otherwise known as ‘insiders’ within the organisation.

Cyber-security has been a major concern for businesses since the introduction of digital assets, even as new technology models, along with greater reliance on technology are driving changes in companies approach to security.

With so many available options (on-premises private clouds, off-premises public clouds, hybrid cloud bursting, and the mix-and-match approach of “multi-cloud), deciding how best to move forward can be very overwhelming. The crowding landscape of public cloud providers only exacerbates things with new players and new offerings constantly entering the scene. However there are three key things to consider as you transform IT: Performance, Cost, and Agility.

According to a newly released report from security vendor Bitglass, Spies in the Enterprise, one-third of organizations have experienced data leakages as a result of insider negligence or attacks; 74 percent say they are vulnerable to these threats, while (56 percent) believe that insider leaks have increased in recent times. Further statistics show that among the key areas of concern; 71 percent of cyber-security professionals alluded to the fact that inadvertent leaks result from risky unsanctioned app usage, including unintended external sharing and the use of unsecured mobile devices. Negligence and malicious insiders are also areas of concern for executives.

Similarly data also indicates that this user group, more than any other, represents the greatest security risk. Analysis shows that more than 60 percent of organizations voiced concerns about privileged users. Collaboration tools and the cloud were also viewed as serious insider threat risks. The report also found that clouds and mobile devices are forcing IT to rethink detection and prevention. Cybersecurity professionals agree that lack of employee training, insufficient data protection solutions, more devices with access to sensitive data and more data leaving the network perimeter contribute to insider leaks. By and large the report surveyed over 500 cyber-security professionals globally.

Conclusively, the question on the mind of most business executives is “how can I protect my organization’s information from these threats. The answer are not farfetched and they include;

  • Install Apps that are necessary and useful.
  • Research apps before downloading, preferably check the publisher and app reviews.
  • Look out for app permissions during the installations and check the market listing or developer any suspicious permission(s).
  • Users’ whereabouts can be exposed via smart phones and tablets because most of them have a feature called location tracking that can be used by apps to deliver services tailored to the tablet or phone’s current location. But such information can also be used in ways that can expose the user to danger.
  • Be wary of phishing scams and malware via the Web browser or SMS messages
  • Limit the amount of personal information you post. Do not post information that would make you vulnerable, such as your address or information about your schedule or routine.
  • Be skeptical, don’t believe everything you read online. People may post false or misleading information about various topics, including their own identities.
  • Evaluate your settings – Take advantage of a site’s privacy settings. The default settings for some sites may allow anyone to see your profile, but you can customize your settings to restrict access to only certain people. However there is still a risk that private information could be exposed despite these restrictions. So don’t post anything that you wouldn’t want the public to see. Sites may change their options periodically, so review your security and privacy settings regularly to make sure that your choices are still appropriate.

FITC has been reporting on Fraud and Forgery for the past fifteen years. The report which is been published quarterly has helped to mitigate fraud and involved in research and training that relates to security, for fifteen years they carried out fraud and forgery report on Nigerian banks. This report help to educate and mitigate fraud in Nigerian banks. They are part of the committee set up by CBN to designed the framework for antifraud

 

References:

http://www.cioinsight.com/blogs/why-privileged-users-are-a-major-security-risk.html?utm_medium=email&utm_campaign=CIO_NL_CIQF_20161004_STR4L1&dni=363722141&rni=24579841#sthash.LLscGBLI.dpuf

http://www.computerworld.com/article/2501549/endpoint-security/5-free-android-security-apps–keep-your-smartphone-safe.html

US-CERT Publications

http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm

 

 

 

Contributed by:
Eze Vivian
MIS Unit

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>