{"id":6,"date":"2022-08-05T08:12:54","date_gmt":"2022-08-05T08:12:54","guid":{"rendered":"https:\/\/epssecurity.ro\/index.php\/2022\/08\/05\/blog-1\/"},"modified":"2022-08-09T08:40:57","modified_gmt":"2022-08-09T08:40:57","slug":"blog-1","status":"publish","type":"post","link":"https:\/\/epssecurity.ro\/index.php\/2022\/08\/05\/blog-1\/","title":{"rendered":"A security awareness poster\u00a0of the\u00a0cyber\u00a0crime threats"},"content":{"rendered":"<p>Cyber attacks are increasing in number and sophistication and we must share responsibility to make our workplace a more secure environment for ourselves. Everyone should feel accountable for the security of their networks and devices.<\/p>\n<p>There are some measures that you should take to protect your workplace from cyber crime attacks. Preventing incidents from occurring in the \ufb01rst place is a better way then controlling damage after the incident have taken place.\u00a0<\/p>\n<p>The most important threats that\u00a0cyber\u00a0crime\u00a0presents to our workplace:<\/p>\n<p><b>Phishing <\/b>is a method used to obtain sensitive or personal information from a computer user. Phishing is an act by which cyber criminals attempt to obtain confidential data as the credit card number or username and password of any account. The main purpose of phishing is to acquire important data of company and employees to produce financial loss. Phishing is realised by sending e-mail or websites in which cyber criminals ask about your personal information and become activated when you are clicking on their link.<\/p>\n<p><b>Malware<\/b>, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim\u2019s data, applications, or operating system. Malware cause widespread damage and disruption and necessitating extensive recovery efforts within most organisations.<\/p>\n<p><b>\u00a0<\/b><b>Social engineering,<\/b> in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information about co-workers and company. Many social engineering exploits simply rely on people&#8217;s willingness to be helpful. The attacker might pretend to be a co-worker who has an urgent problem that requires access to additional network in the purpose of information gathering, fraud, or system access.<\/p>\n<p><strong>How to mitigate those threats:<\/strong><\/p>\n<p>&#8211; Always check the recipient of an email and the source of a message. Hackers have the technology to generate phishing emails from what appear to be familiar email addresses.<\/p>\n<p>&#8211; Avoid downloading unnecessary files, illegally obtaining music or films, or accessing inappropriate websites, even after office hours or off-site Don\u2019t trust people blindly and don\u2019t give away confidential information to strangers.<\/p>\n<p>&#8211; Don\u2019t use unknown USB drivers!\u00a0 Once it\u2019s plugged in, a virus can be activated, and hackers could then have access to their computer and network. Don\u2019t plug anything into your work computer without knowing the origin.<\/p>\n<p>&#8211; Try to get in the habit of keeping your home technology and work technology completely separate. That way, you can rest assure that whatever you or your family is doing on personal equipment will not impact the security of others at work.<\/p>\n<p>&#8211; Report all suspicious cyber Incidents, including suspicious e-mails and questions, system failures, and unauthorized access or use or unusual problems with your computer to your IT department.<\/p>\n<p>&#8211; Make your passwords complex. Use numbers, symbols, and letters (uppercase and lowercase) and change it regularly.<\/p>\n<p>&#8211; Do not give any of your usernames, passwords, or other computer\/ website access codes to anyone.<\/p>\n<p>&#8211; Do not open emails, links, or attachments from strangers.<\/p>\n<p>&#8211; Do not install or connect any personal software or hardware to your organization\u2019s network without permission from your IT department.<\/p>\n\n\n<p class=\"wp-block-paragraph\">Cyber security is everyone\u2019s responsibility and we each have a role to play. When every employee is active in securing their individual computers, the entire company network is obtaining a stronger security posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks are increasing in number and sophistication and we must share responsibility to make our workplace a more secure environment for ourselves. Everyone should feel accountable for the security of their networks and devices. There are some measures that you should take to protect your workplace from cyber crime attacks. Preventing incidents from occurring &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/epssecurity.ro\/index.php\/2022\/08\/05\/blog-1\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;A security awareness poster\u00a0of the\u00a0cyber\u00a0crime threats&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_regular_price":[],"currency_symbol":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"post_slider_layout_featured_media_urls":{"thumbnail":"","post_slider_layout_landscape_large":"","post_slider_layout_portrait_large":"","post_slider_layout_square_large":"","post_slider_layout_landscape":"","post_slider_layout_portrait":"","post_slider_layout_square":"","full":""},"_links":{"self":[{"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/posts\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":2,"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/posts\/6\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/posts\/6\/revisions\/183"}],"wp:attachment":[{"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/media?parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/categories?post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epssecurity.ro\/index.php\/wp-json\/wp\/v2\/tags?post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}