{"id":5000,"date":"2016-01-05T18:11:19","date_gmt":"2016-01-05T18:11:19","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5000"},"modified":"2019-11-15T22:55:29","modified_gmt":"2019-11-15T11:55:29","slug":"a-few-recommendations-on-the-cybersecurity-of-the-workplace","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/a-few-recommendations-on-the-cybersecurity-of-the-workplace\/5000\/","title":{"rendered":"A few recommendations on the cybersecurity of the workplace"},"content":{"rendered":"<p>Holiday season is over, and hopefully everyone had a decent rest and some well-earned time of peace and quiet.<\/p>\n<p>Now, we\u2019re back to work. For the first 2016 Kaspersky Business blog post, we\u2019ve chosen a topic that may sound a bit too hortatory: Commandments of Office Security. It\u2019s actually a\u00a0handful of common problems with cybersecurity in the workplace, and the ways to solve \u2013 or at least mitigate \u2013 them. This is not a complete list, of course, as there are many more issues. Let\u2019s take a closer look.<\/p>\n<p><strong>Case one: somebody knows worse<\/strong><\/p>\n<p>It isn\u2019t Alice\u2019s job to watch out for cybersecurity. \u00a0She\u2019s the CFO in a medium-sized firm, but she\u2019s learnt to be cautious long ago, and is very good at recognizing\u00a0phishing letters from the legit ones.<\/p>\n<p>When a message ostensibly from the IRS hit her inbox, Alice felt her suspicions rising. Although everything looked okay, there was something a bit sinister with the date \u2013 out of cycle, too early.<\/p>\n<p>Anyway, it was late evening, past working hours already, so checking out the source wasn\u2019t an option. Alice chose not to open the attachment until she could ascertain the source \u2013 i.e. until the next morning.<\/p>\n<p>Too bad she had to be OOO the next day. And her assistant tasked with handling the boss\u2019 emails while she was away, was\u00a0a much-less experienced person \u2013 and fell for the trick.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>A few recommendations on the cybersecurity of the #workplace<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fv1qd&amp;text=A+few+recommendations+on+the+cybersecurity+of+the+%23workplace\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>The breakdown<\/strong><\/p>\n<p>This scenario may seem a bit far-fetched, but it is not necessarily. It was Alice\u2019s mistake (or, rather, a result of a faulty security policy in the entire company) that the wrong person was tasked with handling executive emails. Executives are among the primary targets for <a href=\"https:\/\/business.kaspersky.com\/av-comparatives-awards-kaspersky-labs-anti-phishing-technology\/4494\/\" target=\"_blank\" rel=\"noopener nofollow\">phishers<\/a> and <a href=\"https:\/\/business.kaspersky.com\/apt-predictions-for-2016-there-will-be-no-more-apts-oh-wait\/4821\/\" target=\"_blank\" rel=\"noopener nofollow\">APT<\/a> actors.<\/p>\n<p>Education of the staff against phishing is a highly recommended proactive security measure. As is the deployment of an automatic anti-exploit system such as <a href=\"https:\/\/business.kaspersky.com\/a-problem-of-exploits\/4248\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Automatic Exploit Prevention<\/a> solution. It wouldn\u2019t let the exploit through.<\/p>\n<p><strong>Case two: Let the guest remain the guest<\/strong><\/p>\n<p>Jerome wasn\u2019t expecting anything bad from a friend visiting him in the office shortly before the end of the day. The friend asked if there was\u00a0WiFi available for his tablet, and Jerome handed over the password to the company\u2019s internal network. It turned out the friend\u2019s tablet wasn\u2019t secure and clean\u2026<\/p>\n<p><strong>The breakdown<\/strong><\/p>\n<p>This is why\u00a0guest networks exist. Jerome has definitely violated the company\u2019s security policy by allowing a stranger inside the network. Even if a stranger didn\u2019t mean any harm, the malware sitting in his devices did.<\/p>\n<p>The guest network should be totally isolated from the internal network, and data exchange between them should be very limited and strongly controlled. Otherwise\u2026 well, hopefully, removing the Android malware that slipped from the guest\u2019s device into the internal network wasn\u2019t much of a big deal.<\/p>\n<p><strong>Case Three: The bird of prey carried something away<\/strong><\/p>\n<p>Chuck has never been good at fighting, especially if outnumbered in a dark alley late at\u00a0night. Thugs got away with Chuck\u2019s smartphone, Fortunately, his health was damaged much less than his ego. But there was yet another reason for his anxiety: the smartphone contained certain working files that weren\u2019t supposed to fall into the wrong hands. And that is exactly what happened.<\/p>\n<p><strong>The breakdown<\/strong><\/p>\n<p>Depending on whether the smartphone was \u201cregistered\u201d with the company\u2019s IT staff and the <a href=\"https:\/\/business.kaspersky.com\/mobile-device-management-and-device-control-in-kaspersky-endpoint-security\/1082\/\" target=\"_blank\" rel=\"noopener nofollow\">appropriate measures<\/a> are deployed, the problem is either huge or almost non-existent.<\/p>\n<p>If the smartphone is armed with the <a href=\"https:\/\/business.kaspersky.com\/data-isolation-patent\/4829\/\" target=\"_blank\" rel=\"noopener nofollow\">corporate security solution<\/a> and anti-theft tools, the device will be soon retrieved, or sensitive data wiped off remotely, or, in the worst case, the criminals will be left with a useless \u201cbrick\u201d in their hands before they are going to sell it.<\/p>\n<p>Otherwise, the repercussions may go far and wide for the entire company. The chance\u00a0that Chuck was not a random victim, and the thugs were really going after his smartphone specifically are slim. Such a scenario would fit in a spy flick like \u201cMission: Impossible\u201d, but even more outlandish things happen, so discarding such situation would be unwise.<\/p>\n<p>With BYOD every user and every carrier of the work-related data becomes the network endpoint and as such requires protection, which can only be provided if the IT staff is aware of the existence of these \u201cendpoints\u201d \u2013 first and foremost personal devices used for work.<\/p>\n<p><strong>Case Four: A yellow sticker and webcam<\/strong><\/p>\n<p>Passwords, passwords, passwords. A damning number of them have to be memorized over the course of everyday work. It is such a temptation to use just one or a handful of similar ones, or to write them all down on a sticky note and keep it nearby.<\/p>\n<p>That\u2019s what Andy did. On the wall there is a handful of yellow stickers with multiple arcane, hard to break, impossible to guess combinations of symbols, letters, and digits.<\/p>\n<p>When these passwords were used by the cyber-intruders to wreak havoc in Andy\u2019s company network, he was knee-deep in trouble. Eventually, investigators found out that those stickers were photographed with a nearby laptop\u2019s web-cam.<\/p>\n<p><strong>The breakdown<\/strong><\/p>\n<p>Passwords aren\u2019t something to be shown for all to see. Even though it may seem that nobody guesses which password belongs where, leaving them on the plain sight is as unsafe as sharing them in plain text via e-mail, for instance.<\/p>\n<p>And the safe approach? \u2013 A good <a href=\"https:\/\/business.kaspersky.com\/password-management-in-kaspersky-small-office-security\/1290\/\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a> that will have you remember just one master password.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Share with us your own experiences with workplace cybersecurity #backtowork #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fv1qd&amp;text=Share+with+us+your+own+experiences+with+workplace+cybersecurity+%23backtowork+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Wisdom of a mild paranoia<\/strong><\/p>\n<p>Now, these are a few scenarios related to various cyberincidents in the work environment. They may look \u201cfantastic\u201d, but they are not \u2013 cyberattackers really use webcams for \u201cintel-gathering\u201d (remember Carbanak).<\/p>\n<p>The list of \u201ccommandments\u201d of cybersecurity in the workplace would be long, much longer than these four cases, but the basics are these:<\/p>\n<p>\u2013 Do everything to prevent phishers from success (phishing letters are the first attack vector for a long list of other threats);<\/p>\n<p>\u2013 Set up a guest network and keep it isolated from the internal one, and no non-employees are to use the internal network;<\/p>\n<p>\u2013 If BYOD is in, take the \u201calways guilty, always wrong\u201d approach to the \u201cvisiting\u201d devices. Admins should always know what devices you are using for work and have a remote \u201ckill switch\u201d for working data on such devices in case they are\u00a0lost or stolen, or the owner is leaving the company;<\/p>\n<p>\u2013 Passwords should be kept privately, only accessible to their specific user; using a password manager is the best way, using stickers on the wall is the worst.<\/p>\n<p>We can add here a recommendations to restrict use of <a href=\"https:\/\/business.kaspersky.com\/malicious-links-in-social-networks-a-costly-experience\/1145\/\" target=\"_blank\" rel=\"noopener nofollow\">social networks<\/a>, unless they are necessary over the course of work, and file sharing services\/clouds unless they are absolutely necessary. Perhaps this may look a bit over the top, but if there is something to lose, better to do everything to prevent such losses.<\/p>\n<p>Please feel free to share your own experience and thoughts on the cybersecurity in the office.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the first 2016 Kaspersky Business blog post, we&#8217;ve chosen Commandments of Office Security, a handful of common problems with cybersecurity in the workplace, and the ways to solve &#8211; or at least mitigate &#8211; them.<\/p>\n","protected":false},"author":209,"featured_media":15350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2377,2302,2378],"class_list":{"0":"post-5000","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-backtowork","10":"tag-protectmybiz","11":"tag-workplace"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-few-recommendations-on-the-cybersecurity-of-the-workplace\/5000\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-few-recommendations-on-the-cybersecurity-of-the-workplace\/5000\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/a-few-recommendations-on-the-cybersecurity-of-the-workplace\/10029\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-few-recommendations-on-the-cybersecurity-of-the-workplace\/5000\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/backtowork\/","name":"backtowork"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=5000"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5000\/revisions"}],"predecessor-version":[{"id":24627,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5000\/revisions\/24627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15350"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=5000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=5000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=5000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}