Connect with us

Strategies

Tips for staying secure while working from home

Because many devices attached to home networks don’t get patched or updated as frequently as corporate devices, the most common exploits detected so far in 2020 have targeted older systems. Nearly two-thirds of attacks targeted vulnerabilities disclosed in 2018, and a quarter targeted vulnerabilities from 2004.

Published

on

Due to the global pandemic, nearly two-thirds of companies have moved half or more of their employees to telework. Sixty-two percent of employed Americans, for example, say they have worked from home during the crisis, with the number of remote employees doubling between March 13 and April 2 of 2020, and this is not just a temporary change. Nearly a third of all organizations with remote workers expect that half or more will continue working from home after the pandemic. 

The security implications of such a dramatic transition in such a short period of time cannot be overstated. Under normal circumstances, moving an entire workforce from secure IT environments to home networks with very little cybersecurity would take long-term planning and preparation. But that was not an option in 2020. As a result, 32% of respondents to Fortinet’s 2020 Securing Remote Work Survey found that setting up and managing secure connectivity to be the most challenging aspect of switching to telework.  

Part of the problem was that the devices at the company’s core network were not designed to manage the volume of VPN connections required. As a result, many connections were not secure. Or even if they were encrypted, existing firewalls were incapable of inspecting VPN tunnels to ensure they weren’t being used to deliver malware – at least not without significantly slowing down connections. 

But the other part of the challenge is that many home networks were not setup to support the bandwidth requirements of VPN, let alone bandwidth-hungry business applications such as video conferencing. In addition, end user devices (many workers began working from home using a personal device) were often unpatched and unsecured as were other devices connected to the home network. These challenges made home networks an ideal target for cybercriminals. 

Cybercriminals Are Targeting Remote Workers 

And as one might expect, threat researchers saw a significant shift in the behavior of cybercriminals. According to the latest Threat Landscape Report from FortiGuard Labs, global sensors detected that the top attack targets identified in the first half of 2020 switched from targeting corporate devices and applications to things like consumer-grade routers and devices such as DVRs normally attached to home networks.  

There was also a significant increase in attacks targeting end users that used concerns about the coronavirus to lure them into clicking on malicious web links or open attachments infected with ransomware or other malware.

Part of the problem was that the devices at the company’s core network were not designed to manage the volume of VPN connections required. As a result, many connections were not secure.

The FortiGuard Labs team saw an average of about 600 new phishing campaigns per day during the spring. And because home users were no longer protected by corporate security devices, web-based malware became the most common attack vehicle, outranking email as the primary delivery vector used by cybercriminals for the first time in years.  

And because many devices attached to home networks don’t get patched or updated as frequently as corporate devices, the most common exploits detected so far in 2020 have targeted older systems. Nearly two-thirds of attacks targeted vulnerabilities disclosed in 2018, and a quarter targeted vulnerabilities from 2004. 

Seven Recommendations for Remote Workers 

During the last several months, IT teams have been scrambling to close the security gaps in their remote worker strategy. But while 92% of organizations report budget investments to address teleworker security, end users are still the front line of any security strategy – and never more so than now. Here are a few suggestions of what they can do to reduce risks. 

  1. Learn to Spot Attacks: Many organizations are sponsoring training programs to help their workers identify suspicious emails, websites, text messages, etc. In addition, there are free programs available online to provide end users with essential security training and information. And make sure everyone at home using the network, from roommates to children, get cybersecurity training as well. 
  2. Harden Passwords: Another easy step is to simply make passwords harder to guess, and also use different passwords for different accounts. To manage these passwords, use a secure password management system that can remember passwords. Then all anyone needs to remember is the login information for that one application. 
  3. Use Multi-Factor Authentication (MFA): Also known as two-factor authentication, MFA combines something a user knows, such as a password, with something they have, such as a fingerprint or a security token. MFA should especially be used when accessing financial information or logging onto the company network. 
  4. Patch Home Devices: Have users look at all of their devices at home and make sure they are running the latest versions of their operating systems. Even gaming and entertainment systems have options that let users check to see if they are running the latest version. 
  5. Secure Home Networks: This is probably a good time to consider adding or upgrading a security application to protect the home network and devices from attacks. In addition, many home routers now include gateway security which should also be enabled. Some cable operators and internet service providers also provide free security. Remote workers should make sure that logging onto the home WiFi requires a password. They should consider an email gateway that can detect and filter out malicious email attachment and links. 
  6. Improve Device Security: New advanced endpoint security solutions, known as endpoint detection and recovery (EDR), not only provides better threat detection, but also prevents infections that manage to get onto your device from executing their malware. EDR solutions should not only be applied to remote worker devices, but also on other endpoint devices in the home.   
  7. Upgrade Internet Connections: Remote workers should consider upgrading their internet service so they can run business-critical applications even when others are streaming movies or playing online games. Companies should consider providing funds to help offset the cost of a bandwidth upgrade. 

Enhance Your Remote Work Security Now 

Cybercriminals will continue to target remote workers, with no signs of letting up. Adding these seven steps to any corporate security strategy is the right way to begin protecting today’s distributed networks that include remote workers. 

Strategies

People willing to pay more for coffee that’s ethical and eco-friendly, meta-analysis finds

Overall, ecolabelling worked as intended: people were willing to pay for socially responsible coffee.

Published

on

Photo by Nathan Dumlao from Unsplash.com

Lesson for coffee biz…

Beyond how much cream and sugar to add to their morning brew, coffee lovers also face more serious decisions: one of those is whether or not to buy ecolabelled coffee, which advertises itself as more ethical and environmentally friendly. But whether customers are willing to pay the extra price for these perks remains an unanswered question.

In a study publishes in the journal Heliyon, researchers combined data from 22 studies to conclude that in general, people are willing to pay $1.36 more for a pound of coffee that’s produced in an eco-friendly way and are especially partial to coffee that’s labelled “Organic.”

“We hear in the media or sometimes read in the newspaper that there is an increasing number of ecolabelling logos in the market, and that these logos are sometimes related or even look alike. This may reduce consumers’ trust and willingness to pay over time,” says first author Nizam Abdu, a Ph.D. candidate and research assistant at the University of Tasmania in Australia. “However, our results show that coffee consumers in some selected countries are still willing to pay a positive and significant premium for ecolabelling.”

As many people’s go-to beverage, coffee’s enormous social, cultural, and economic influence makes it an ideal candidate for ecolabelling, a system that identifies and certifies certain products with ethical and environmental benefits. Common coffee ecolabels include Organic, Country of Origin Labelling (COOL), and Fairtrade (a certification that workers are given fair wages and safe working conditions) and aim to help consumers make informed choices on food safety, health, and environmental impact. However, it’s possible that having too many ecolabel options will instead confuse buyers, causing them to avoid buying ecolabelled coffee.

Many previous studies have tried to quantify the public’s opinion on different types of coffee ecolabelling. But the studies have varied dramatically in their estimates of how much consumers are willing to pay: some found that people are willing to pay more, while others suggest that people actually are less willing to pay for ecolabelling. As a result, it’s been challenging to present a standardized conclusion on the overall effectiveness of ecolabels.

Abdu and his co-author set out to address this gap. They combined data from 22 studies over the past fifteen years, forming an overall dataset of 97 observations across Europe, North America, Africa, and Asia. With their meta-analysis, they wanted to understand what factors give rise to the large range of price estimates and determine once and for all whether consumers are willing to pay more for coffee ecolabelling.

The researchers found that the variation in previous studies came down to a few factors: the region or country under study, surveying methods, types of ecolabels, and publication bias, the tendency for only studies with the desired outcome to be published. For example, there was a noticeable effect on the studies’ results when survey participants made yes/no choices about which coffee they’d buy versus when they were given trade-offs and budget constraints.

After taking these things into account, however, they found that overall, ecolabelling worked as intended: people were willing to pay for socially responsible coffee.

“In general, consumers are happy to pay a premium price of $1.36 for a pound of ecolabelled coffee. In particular, we clearly see that Organic is the most crucial coffee attribute,” says Abdu. The specific ecolabels of Fairtrade, COOL, and Organic all had values significantly larger than zero, but Organic ecolabelling had the highest value of the three – people were willing to pay an additional $1.14 per pound of coffee for just the Organic ecolabel.

That said, consumer attitudes still varied depending on factors like location. For instance, compared to other regions, people were less willing to pay more for ecolabelled coffee in North America, which may suggest that preference for such a labelling system varies across the regions. The researchers were also surprised to find that while people did care where their coffee came from, they didn’t necessarily prefer coffee that was produced near them. “I was expecting consumers would prefer locally produced coffee,” he says.

The authors say, however, that their finding still suggests a clear preference among consumers for certain types of ecolabelling. Abdu says, “Our findings are a good indicator that the policy of coffee ecolabelling is working in the global coffee market.”

Continue Reading

Strategies

10 Security misperceptions that need to be addressed immediately

The list is based on the experience of Sophos Rapid Response, a team of expert incident responders who deliver fast assistance in identifying and neutralizing active threats such as malware infections, compromised data, or unauthorized access, among others.

Published

on

Photo by Mimi Thian from Unsplash.com

With June marking National ICT Month in the Philippines and the Department of Information and Communications Technology (DICT) adopting the CHIP (Connect, Harness, Innovate, and Protect) framework for digital transformation and underscoring the value of protection,  Sophos compiled   a guide for Filipino businesses so they can avoid  today’s most commonly held security misperceptions.

The list is based on the experience of Sophos Rapid Response, a team of expert incident responders who deliver fast assistance in identifying and neutralizing active threats such as malware infections, compromised data, or unauthorized access, among others.

Misperception 1: We are not a target. We are too small or have no assets of value to an adversary 

Sophos Advice: Many cyberattack victims assume they are too small, in a sector of no interest, or lacking the kind of lucrative assets that would attract an adversary. The truth is, it doesn’t matter. If you have the processing power and a digital presence, you are a target. Despite the media headlines, most attacks are not perpetrated by advanced nation-state attackers. They are launched by opportunists looking for easy prey and low-hanging fruit, such as organizations with security gaps, errors, or misconfigurations that cybercriminals can easily exploit. 

Misperception 2: We don’t need advanced security technologies installed everywhere 

Sophos Advice: Some IT teams still believe that endpoint security software is enough to stop all threats or don’t need security for their servers. Attackers take full advantage of such assumptions. Any mistakes in configuration, patching, or protection make servers a primary target, not a secondary one, as might have been the case in the past.

Based on the incidents that Sophos Rapid Response has investigated, servers are now the number one target for attacks. Attackers can easily find a direct route using stolen access credentials.  Suppose your organization relies only on basic security without more advanced and integrated tools such as behavioral and AI-based detection and a 24/7 human-led security operations center. In that case, intruders will likely find their way past your defenses.

Misperception 3: We have robust security policies in place 

Sophos Advice:  Having security policies for applications and users is critical. However, they need  to be checked and updated constantly as new features and functionality are added to devices connected to the network. Verify and test policies using techniques such as penetration testing, tabletop exercises, and trial runs of disaster recovery plans. 

Misperception 4: Remote Desktop Protocol (RDP) servers can be protected from attackers by changing the ports they are on and introducing multi-factor authentication (MFA) 

Sophos Advice: The standard port used for RDP services is 3389, so most attackers will scan this port to find open remote access servers. However, the scanning will identify any available services, so changing ports offers little or no protection on its own. 

Further, while introducing multi-factor authentication is essential, it won’t enhance security unless all employees and devices enforce it. RDP activity should occur within the protective boundary of a virtual private network (VPN). Still, even that cannot fully protect an organization if the attackers already have a foothold in a network. Ideally, unless its use is essential, IT security should limit or disable RDP internally and externally.

Misperception 5: Blocking IP addresses from high-risk regions such as Russia, China, and North Korea protects us against attacks from those geographies 

Sophos Advice:  Blocking IPs from specific regions is unlikely to do any harm, but it could give a false sense of security if it’s the sole means of protection. Adversaries host their malicious infrastructure in many countries, with hotspots in the US, the Netherlands, and the rest of Europe. 

Misperception 6: Our backups provide immunity from the impact of ransomware 

Sophos Advice: Keeping up-to-date backups of documents is business-critical. However, if your backups are connected to the network, then they are within reach of attackers and vulnerable to being encrypted, deleted, or disabled in a ransomware attack. 

Storing backups in the cloud also needs to be done with care. The standard formula for secure backups to restore data and systems after a ransomware attack is 3:2:1. Three copies of everything, using two different systems, one of which is offline. 

Having offline backups in place won’t protect your information from extortion-based ransomware attacks, where the criminals steal and threaten to publish your data instead of or as well as encrypting it. 

Misperception 7: Our employees understand security 

Sophos Advice: According to the State of Ransomware 2021, 22% of organizations believe they’ll be hit by ransomware in the next 12 months because it’s hard to stop end users from compromising security. 

Social engineering tactics like phishing emails are becoming harder to spot. Messages are often hand-crafted, accurately written, persuasive, and carefully targeted. Your employees need to know how to spot suspicious messages and what to do when they receive one. Who do they notify so that other employees can be alerted? 

Misperception 8: Incident response teams can recover my data after a ransomware attack

Sophos Advice: This is very unlikely. Attackers today make far fewer mistakes, and the encryption process has improved, so relying on responders to find a loophole that can undo the damage is extremely rare. Automatic backups like Windows Volume Shadow Copies are also deleted by most modern ransomware and overwriting the original data stored on disk, making recovery impossible other than paying the ransom. 

Misperception 9: Paying the ransom will get our data back after a ransomware attack 

Sophos Advice: According to the State of Ransomware survey 2021, an organization that pays the ransom recovers on average around two-thirds (65%) of its data.  A mere 8% got back all of their data, and 29% recovered less than half. Paying the ransom even when it seems easier and covered by your cyber-insurance policy is therefore not a straightforward solution to getting your data back. 

Misperception 10: The release of ransomware is the whole attack – if we survive that we’re OK 

Sophos Advice: Unfortunately, this is rarely the case. Ransomware is just the point where the attackers want you to realize they are there and what they have done. 

The adversaries are likely to have been in your network for days if not weeks before releasing the ransomware, exploring, disabling, or deleting backups, finding the machines with high-value information or applications to target for encryption, removing information, and installing additional payloads such as backdoors. Maintaining a presence in the victim’s networks allows attackers to launch a second attack if they want to. 

Continue Reading

Strategies

Use rewards effectively to boost employee creativity

The choice of rewards fostered creativity by raising the employees’ belief in their ability to be creative. Alternative rewards also had a powerful impact on boosting the creativity of employees who earlier had scored high on an assessment of creative personality characteristics.

Published

on

Photo by Roberto Nickson from Pexels.com

To boost employees’ creativity, managers should consider offering a set of rewards for them to choose from, according to a new study by management experts at Rice University, Tulane University, the University of North Carolina at Greensboro and National Taiwan Normal University.

The study, co-authored by Jing Zhou, the Mary Gibbs Jones Professor of Management and Psychology at Rice’s Jones Graduate School of Business, is the first to systematically examine the effects of reward choice in a field experiment, which was conducted in the context of an organizationwide suggestion program. An advance copy of the paper is published online in the Journal of Applied Psychology.

“Organizations spend a lot of resources and exert a great deal of effort in designing incentive schemes that reward the employees who exhibit creativity at work,” Zhou said. “Our results showed that the effort may be a bit misplaced. Instead of discovering one reward type that is particularly effective at promoting creativity, what is more effective is to provide the employees with the opportunity to choose from several reward types, if they submit one or more ideas that are among the top 20% most creative ones.”

Workers in the study were given a range of options: a financial reward for the individual employee or their team, a self-discretionary reward such as getting priority to select days off, or a donation the company made to a charity selected by the employee. Those choices had positive, significant effects on the number of creative ideas employees generated and the creativity level of those ideas, Zhou and her co-authors found.

The researchers arrived at their findings by conducting a quasi-experiment at a company in Taiwan over the course of several months. Then they conducted a second experimental study that included employees from 12 organizations in Taiwan to replicate the first study’s results and compared the results with a control group.

The studies also found that rewards aimed at helping others, such as making a donation to a charity, might be especially powerful. But for less-creative employees, alternative rewards that benefit those in need might actually lower creativity and should be avoided, the authors said.

The researchers also found that the choice of rewards fostered creativity by raising the employees’ belief in their ability to be creative. Alternative rewards also had a powerful impact on boosting the creativity of employees who earlier had scored high on an assessment of creative personality characteristics.

Zhou co-authored the paper with Greg Oldham of Tulane, Aichia Chuang of the University of North Carolina at Greensboro and Ryan Shuwei Hsu of National Taiwan Normal University.

Continue Reading
Advertisement
Advertisement

Like us on Facebook

Trending