Saudi students bag 27 awards at Regeneron ISEF 2024    Civil defense issues weather warning amid forecasted thunderstorms    Public security launches online service for reporting financial fraud on Mada cards via Absher    Ministry of Interior reports over 16,000 violations in latest inspection campaign    Aramco signs three MoUs with American companies to advance lower-carbon energy solutions    King Abdulaziz University launches female admissions in maritime studies    Palestinian death toll nears 35,400 as Israel continues to pound Gaza    Pro-Palestinian protests continue across US campuses amid arrests    White House confirms evacuation of 17 American doctors from Gaza hospital    Tense calm in New Caledonia as France increases security presence    Jorge Jesus praises Al Hilal's resilience after dramatic last-minute draw in Riyadh Derby    Saudi Arabia's RGA implements innovative road technology for Hajj season    Star golfer Scottie Scheffler arrested over alleged assault on police officer    Saudi Arabia joins International Agency for Research on Cancer    Row erupts over portraits of Australia's richest woman    Al-Ittihad's victory drought continues, misses chance to qualify for ACL elite    Al Ittihad CEO frustrated with 'not positive' SPL feedback, announces internal assessment    Cognite Data Fusion now available on Google Cloud in Saudi Arabia    Indian spices face heat over global safety concerns    Glioblastoma: Top Australian doctor remains brain cancer-free after a year    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    We have celebrated Founding Day for three years - but it has been with us for 300    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Cybersecurity is a puzzle, make sure you have all the pieces
Published in The Saudi Gazette on 31 - 12 - 2020

Spare a thought for the modern CISO. The global cybercrime industry has been in overdrive since the start of the year, as threat actors capitalise on the disruption brought by the coronavirus pandemic.
The Mimecast Threat Centre found a dramatic increase in cyberattacks during the first 100 days of the pandemic. In Middle East and North Africa, spam attacks increased by 36% and malware by 22%.
Cybersecurity is a ‘complex puzzle'
To protect against these threats, organizations are having to build complex, multi-layered security strategies that safeguard customers, employees, and company data. The sheer volume of threats and the abundance of attack vectors makes effective cybersecurity a complicated puzzle.
In many cases, organizations have no clear idea of how to put those puzzle pieces together in an effective way. Encouragingly, 82% of organizations surveyed in the UAE and Saudi Arabia in Mimecast's State of Email Security 2020 report, say they have a cyber resilience strategy or are actively rolling one out.
Yet, 67% of respondents still believe it's inevitable or likely they will suffer from an email-borne attack in the coming year. This begs the question; do they have all the right measures in place to fully protect their organization and be totally resilient?
What are the pieces of the cybersecurity puzzle? In our experience, the following four elements can add up to a holistic cybersecurity strategy that protects customers, employees, and data from exploitation:
Visibility
Without visibility over employees, data, and your online brand, building an effective cybersecurity strategy is a bit like building a puzzle in the dark. Threat intelligence can play a vital role by providing insight into how organizations are targeted, what cyber threats have been blocked and why, which employees are the riskiest and what actions to take to optimise the broader cybersecurity strategy.
However, visibility should extend beyond the perimeter of the organisation. The speed at which cybercriminals can imitate brands online, makes it easy to launch sophisticated attacks using lookalike domains that can easily trick customers, partners, and employees.
Tools such as DMARC, are effective and an essential piece of the puzzle, but only for protecting domains already owned by the organization, against email brand exploitation. Supplementing DMARC with tools that protect against online brand exploitation can help identify attack patterns at the preparation stage and block compromised assets before they turn into live attacks.
To fully protect a brand, an organization should consider implementing DMARC along with brand exploitation tools, managed from one integrated system that provides both visibility and proactive remediation.
Resilience
All organizations regardless of size are at risk of cyberattack. While defenses are important, being able to quickly recover from a successful attack is just as vital.
Unplanned outages — such as those typical in cloud services such as Microsoft365 — can also disrupt business and lead to losses in productivity, revenue, and reputation. The State of Email Security report found that 60% of organizations in UAE and KSA experienced an Microsoft365 outage in the last 12 months.
Email is still the most widely used business tool and email continuity solutions provide guaranteed access to email, from anywhere and on any device even when email servers fail. Cloud archiving can further help keep corporate knowledge available despite disruptions. And specialized sync-and-recover tools can fill data recovery gaps for those instances where data is corrupted or deleted - whether intentionally or by accident.
Culture
Cybersecurity is at its most effective when every employee understands their role in protecting the organization — and themselves — from attacks. Organizations should seek to instil a culture of cybersecurity awareness that permeates from the top to the bottom of the organization.
Micro-learning together with engagement is the key. Ongoing training that is short, relatable, memorable and that regularly reinforces key concepts works. We know this, because during lockdown periods across the world, Mimecast researchers found that users in organizations that had Mimecast awareness training were 5 times less likely to fall prey to social engineering attacks than those that did not.
Management teams should be ready to take swift action in the wake of a data breach, to ensure the threat is contained, damage mitigated, and the organisation is not at risk of non-compliance to prevailing regulations.
Compliance
While the UAE does not have a comprehensive data protection law at its federal level, there are laws in place that govern privacy and data security. Sector-specific data protection provisions exist for certain laws, while three special economic or sector free zones have specific data protection laws. These data protection laws keep UAE organizations accountable, placing them under pressure to protect customer data.
Both data management and data protection are key elements in achieving compliance. It is difficult for an organisation to achieve data management compliance with unstructured data like email. What's key is to have a third party, independent and immutable data repository that complies to regulatory standards and mitigates legal risks.
The importance of data security and protection is elevated with financial and criminal penalties. Organisations also need to consider the brand damage that is associated with data breaches. Email remains the number 1 attack vector for cyber-attacks. It is widely reported that 91% of all attacks start with an email, with some not even requiring malware.
Call for greater awareness, effort
There is no silver bullet when it comes to security, even when it comes to protecting against a specific attack — like phishing. The entire ecosystem needs to take security seriously or everyone remains at risk.
Protecting your brand and customers with solutions like DMARC and tools that prevent brand impersonation online is important. But if the organization at the receiving end of a phishing email does not have protections in place, they could fall victim to an attack.
Ultimately, the entire business world needs to prioritise security and protect each other. The first step is to consider managing security solutions and resilience tools in an integrated system that helps reduce cost and complexity, and ultimately enhances the broader security ecosystem.
— The writer is cybersecurity expert at Mimecast


Clic here to read the story from its source.