Connect with us

Strategies

Cybersecurity checklist from Kaspersky

To help stressed IT security managers prioritize, we put together some cybersecurity action items for businesses.

Published

on

March 2020 may be remembered as the day the world went on lockdown because of the pandemic. In Southeast Asia, the rushed transition to work from home and then partially back to the office a year later turned to what people now embrace as the new norm. The hybrid work setup isn’t entirely new, but employees now want to stick to it. At the same time, companies have come to accept it after it proved to have worked fairly well for two years. 

Unfortunately, cybercriminals thought it worked to their advantage, too. With tons of valuable data employees bring with them on their devices, it could have felt like the best time for these cyber thugs who found themselves effortlessly stealing from their easy prey.

In 2020, there was an increase globally in the number of people using remote access tools such as remote desktop protocol or RDP, one of the most popular application-level protocols for accessing Windows workstations or servers. It also allows access to other device resources and RDP clients are available for all the most used modern OS such as iOS, OS X, Linux, Unix, and even Android. 

Originally designed as a remote administration tool, cybercriminals use RDP to penetrate the target computer by exploiting incorrectly configured settings or vulnerabilities such as weak passwords. Hacking an RDP connection is lucrative for cybercriminals.

In the same year, there were about 147,565,037 remote desktop protocol (RDP) attack attempts against users of Kaspersky in Southeast Asia. When the workforce slowly started going hybrid in 2021, the RDP attack attempts went up a bit to 149,003,835. It was in 2022 when the pandemic restrictions were lifted and by that time, the RDP attempts spiraled down to 75,855,129 or a plunge of -49% from the previous year. 

“Among our post-pandemic learnings is that flexibility, agility and openness are important to our sustainability and productivity in business. We are still evolving. Part of this evolution is the resounding desire of the workforce in Southeast Asia to stay within the hybrid setup, which boils down to our need for connection and empowerment as humans and we need to acknowledge that,” said Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky.

“Part of listening to what the workforce is asking of us is providing options and support within the cybersecurity framework for their safe return to office work in any form. For companies, you will still have to use technology to drive productivity and it will remain this way as things get more and more sophisticated in the business space,” Yeo added.  

For the employed, switching to working from home has been difficult enough. After getting used to this setup for two years, returning to the office may just be as tricky. Companies are in the same predicament — rolling back some changes would mean jumping through hoops again like how they did when they deployed these in 2020. 

To help stressed IT security managers prioritize, we put together some cybersecurity action items for businesses:

Keep work-from-home cybersecurity workarounds

Whether your workforce is returning from home to office or requires work-related travel, using virtual private network (VPN) and an advanced endpoint and detection response (EDR) solution will ensure their safe return to on-site work. Kaspersky Extended Detection and Response or XDR is a multi-layered security technology that protects IT infrastructure. Whereas EDR focuses on endpoints, XDR focuses more broadly on multiple security control points to detect threats more quickly, using deep analytics and automation. XDR creates security efficiencies by improving detection and response capabilities through unifying visibility and control across endpoints, network, and cloud. It facilitates advanced investigation and threat hunting capabilities across multiple domains from a single console. 

Restore any security controls you disabled for remote workers

To allow remote employees to connect to the corporate network, especially from personal devices, some organizations weakened or disabled cybersecurity controls such as Network Admission Control (NAC). NAC checks computers for compliance with corporate security requirements, such as up-to-date malware protection before granting access to the corporate network. Upon employees’ return to the office, NAC should be turned on to protect the internal systems in case the machines pose any risks. Organizations need to anticipate such issues and have a plan that includes resources, deadlines, bug fixes, and maybe even help from IT integrators. 

Update internal systems

Don’t forget to check internal critical services. The IT security team needs to know if there are any unpatched servers in the building before letting anyone in. With everyone returning to the office and connecting their laptops to the corporate network at once, just one unpatched domain controller can provide broad access to, for example, employee account data and passwords. 

Get ready to save — and also to pay

Bringing employees back to the office may save employers some money. Companies can reduce the number of subscription-based cloud solutions or licenses, such as for video conferencing or electronic signature to bring some services back as local resources. Consider spending those freed-up budgets on organizing digital workstations so that employees can split their weeks between office and elsewhere. Remote work technologies like virtual desktops are much easier to deploy, manage, fix, and protect than remote computers. 

Save the tools and settings that employees used remotely

Thanks to their pandemic experience, employees have mastered new communication and collaboration tools for chats, videoconferencing, planning, CRM, and others. If those tools worked well, employees will want to continue using them. In fact, 74% of Kaspersky’s survey respondents said they want more flexible and comfortable work conditions. Companies should be prepared either to approve new services or to suggest and defend alternatives. Dedicated solutions can help organizations manage access to cloud services and enforce associated security policies. IT security should be a business enabler, not a barrier.  

For SMBs and midrange enterprises, Kaspersky in Southeast Asia also has launched a Buy 1 Free 1 promo. Businesses can now enjoy two years of enterprise-grade endpoint protection for the price of 1 with Kaspersky Endpoint Security for Business or Cloud or Kaspersky Endpoint Detection and Response Optimum, with 24×7 phone support. Interested customers can reach out to sea.sales@kaspersky.com.  

BizNews

Now you see me, now you don’t: How subtle ‘sponsored content’ on social media tricks us into viewing ads

People are not as good at spotting them as they think. If people recognized ads, they usually ignored them – but some, designed to blend in with your friends’ posts, flew under the radar.

Published

on

How many ads do you see on social media? It might be more than you realize. Scientists studying how ads work on Instagram-style social media have found that people are not as good at spotting them as they think. If people recognized ads, they usually ignored them – but some, designed to blend in with your friends’ posts, flew under the radar.

“We wanted to understand how ads are really experienced in daily scrolling — beyond what people say they notice, to what they actually process,” said Maike Hübner, PhD candidate at the University of Twente, corresponding author of the article in Frontiers in Psychology. “It’s not that people are worse at spotting ads. It’s that platforms have made ads better at blending in. We scroll on autopilot, and that’s when ads slip through. We may even engage with ads on purpose, because they’re designed to reflect the trends or products our friends are talking about and of course we want to keep up. That’s what makes them especially hard to resist.”

Learn more

The scientists wanted to test how much time people spent looking at sponsored versus organic posts, how they looked at different areas of these different posts, and how they behaved after realizing they were looking at sponsored content. They randomly assigned 152 participants, all of whom were regular Instagram users, to one of three mocked-up social media feeds, each of which was made up of 29 posts — eight ads and 21 organic posts. 

They were asked to imagine that the feed was their own and to scroll through it as they would normally. Using eye-tracking software, the scientists measured fixations — the number of times a participant’s gaze stopped on different features of a post — and dwell time, how long the fixations last. A low dwell time suggests that someone just noticed the feature, while a high dwell time might indicate they were paying attention. After each session, the scientists interviewed the participants about their experience.

Although people did notice disclosures when they were visible, the eye-tracking data suggested that participants paid more attention to calls to action — like a link to sign up for something — which could indicate that this is how they recognize ads. Participants were also quick to recognize an ad by the profile name or verification badge of a brand’s official account, or glossy visuals, which caused participants to express distrust. 

“People picked up on design details like logos, polished images, or ‘shop now’ buttons before they noticed an actual disclosure,” said Hübner. “On brand posts, that label is right under the username at the top, while on influencer content or reels, it might be hidden in a hashtag or buried in the ‘read more’ section.”

Although the scientists found that the ads often went unnoticed, if people realized that the content wasn’t organic, many of them stopped engaging with the post. Dwell time dropped immediately.

#ad

This was less likely to happen to ads that blended in better, with less polished visuals and a tone and format more typical of organic content. If ad cues like disclosures or call-to-action buttons weren’t noticed right away, they got similar levels of engagement to organic posts. 

“Many participants were shocked to learn how many ads they had missed. Some felt tricked, others didn’t mind — and that last group might be the most worrying,” said Hübner. “When we stop noticing or caring that something is an ad, the boundary between persuasion and information becomes very thin.”

The scientists say these findings show that transparency goes well beyond just labelling ads. Understanding how people really process ads should lead to a rethink of platform design and regulation to make sure that people know when they’re looking at advertising. 

However, this was a lab-based study with simulated feeds, and it’s possible that studies on different cultures, age groups, or types of social media might get different results. It’s also possible that ads are even harder to recognize under real-life conditions.

“Even in a neutral, non-personalized feed, participants struggled to tell ads apart from regular content,” Hübner pointed out. “In their own feeds which are shaped around their interests, habits, and social circles it might be even harder to spot ads, because they feel more familiar and trustworthy.”

Continue Reading

BizNews

Personalized pricing can backfire on companies, says study

If part of the product’s value depends on how many people are using it, think a social media network or e-commerce platform, not being able to see what others are being charged means consumers are fuzzier about how many people are likely to buy in and join the network.

Published

on

Personalized pricing, where merchants adjust prices according to the pile of data about a consumer’s willingness to pay, has been criticized for its potential to unfairly drive-up prices for certain customers.

But new research shows that the practice can also hurt sellers’ profits.

Consumers commonly experience personalized pricing through digital coupons or other discount offers they receive either as potential customers or after making a purchase. Other recent examples include the practice of “Buy Now, Pay Later” plans that bundles the sale of a product with a subsidized loan, which can offer different prices to different customers based on their willingness to pay, and airlines using artificial intelligence to customize prices for individual airfares.

Companies can tweak their prices according to data about a customer’s digital footprint, including their buying preferences, location, lifestyle and even what kind of digital device and operating system they use—all in pursuit of squeezing maximum profit out of the buyer.

The downside though, says Liyan Yang, a professor of finance and the Peter L. Mitchelson/SIT Investment Associates Foundation Chair in Investment Strategy at the University of Toronto’s Rotman School of Management, is that this practice typically obscures the price information available to other consumers, an important factor in their decision to buy.

When prices are transparent to everyone and they’re low, “you know that on average, more people will be buying,” says Prof. Yang.

But if part of the product’s value depends on how many people are using it, think a social media network or e-commerce platform, not being able to see what others are being charged means consumers are fuzzier about how many people are likely to buy in and join the network.

The upshot? “Consumers are going to spend less,” says Prof. Yang.

The researcher put those ideas under a theoretical microscope when he and former Rotman PhD student Yan Xiong, who is now an associate professor at University of Hong Kong Business School, used mathematics and game theory to model what happens when consumers can’t see what other people are being charged for a network-based product. Their models revealed that a company ultimately charged more when prices were concealed compared to when they were transparent, leading to lower profits.

Luckily for companies, there are workarounds. Using similar modelling, the researchers found that the profit pitfall could be avoided through some kind of corporate commitment or backstop related to keeping prices low even as a company also pursued profits.

That could be done by the company committing to keep prices within a certain range or at least to lowering prices through a corporate social responsibility program, by developing a good reputation among consumers, by initially offering low prices that are transparent to attract consumers with a lower price threshold, or through the use of price caps either mandated by government or voluntarily adopted by the company.

Another option is for a government to require companies to charge the same price to all customers, a strategy promoted in China, the European Union and the United States where personalized pricing practices have become an issue.

While companies typically dislike regulation, Prof. Yang points out that theoretically at least, some form of price restriction may lead to better corporate profits in the end.

 “There are trade-offs,” he says, adding that regulators would have to “gauge precisely” where the limits should be to hit the pricing sweet spot that optimizes profits to the company.

The study appeared in the Journal of Economic Theory.

Continue Reading

BizNews

Have you been offended by a discriminatory or harmful ad? You might just buy the product it’s promoting

Published

on

Time plays a key role in consumer behavior, especially concerning the purchasing patterns of vulnerable groups in society who have been ridiculed in offensive and discriminatory ads. Ben-Gurion University researcher Dr. Enav Friedmann examined the long-term reactions of consumers from discriminated groups after exposure to offensive advertising. Such advertising often manifests in marketing messages that demean excluded groups, reinforce harmful stereotypes, or cross social norms.

Their findings were published last month in Psychology & Marketing. Dr. Friedmann is a member of the Department of Business Administration at Ben-Gurion University of the Negev. She is the head of the LBM research lab, which focuses on marketing,

“The social and psychological implications of such advertisements are profound,” explains Dr. Friedmann. “Socially, they normalize prejudice, perpetuate stereotypes, and undermine efforts to achieve equality. We decided to examine these conflicts of social identity combined with consumer behavior. This is a topic that hasn’t been researched enough, but it has significant implications for individuals, groups, and businesses in society.”

The Study’s Approach

To this end, three independent experiments were conducted. They examined the impact of exposure to insulting advertisements or those excluding vulnerable groups (women and people of color) at two time points: immediately upon exposure to the ad, and then 10 days or a month later.

The offensive ads were designed to be inspired by authentic advertisements from companies, which contained offensive content toward women and people of color. A total of 640 women and men, both light-skinned and dark-skinned, participated in all the experiments and answered questions related to the brand and their personal feelings.

Key Findings

In the first experiment, a hypothetical ad for a body soap brand called “BubbleSoap” was presented, with a racist implication toward people of color. A dark-skinned family was shown in the ‘before’ image and a light-skinned family in the ‘after’ image. It was found that dark-skinned participants who felt their ethnic group was severely discriminated against, and tended to identify less with their group, showed a higher purchase intention for the BubbleSoap brand ten days later compared to participants who did not feel their ethnic group was discriminated against.

The second experiment involved an offensive advertisement toward women for a real brand. Participants were randomly exposed to either non-offensive sexist ads or offensive sexist ads. The offensive version was identical but included the text: “Women, I’m sick of you! I get tired of all of you so quickly,” with the well-known tagline below: “You’re not you when you’re hungry.” This ad was inspired by real candy bar ads that mock the idea of men respecting women and aggressively disparage women under the guise of sarcastic humor.

After about a month, it was found that women who identified their gender group as significantly discriminated against, and tended to identify less with the female group, were more likely to choose the brand that offended their group. The choice was made at each time point by choosing between three chocolate brands. Of course, the respondents’ initial preference for the offensive brand was considered.

In the third experiment, neurological measurements were taken using an EEG device in a lab experiment for a construction company. Participants were randomly exposed to either offensive or non-offensive sexist ads. The offensive version included the text: “She thinks she understands… In big decisions, don’t let her decide!” Participants were asked to describe their feelings toward the brand at two points in time. The researchers measured the activation of the participants’ right and left frontal brain regions during a brand feeling task. After ten days, among women who identified their group as significantly discriminated against, and tended to identify less with the female group over time, increased activity was found in the left frontal areas (compared to the right) of the brain. These areas are known in the literature to indicate a desire to approach a stimulus.

Photo by Marcus Herzberg from Pexels.com

The Paradoxical Phenomenon

The findings revealed a paradoxical phenomenon: participants who reported high levels of perceived discrimination against their group, and over time tended to identify less with the offended group, actually showed an increasing preference for the brand that insulted their group. This was measured through purchase intention, actual product choice, or brain responses indicating an approach toward the brand.

This phenomenon aligns with theories of disidentification, a process in which individuals from vulnerable groups come to understand the long-term consequences of harm to their group (reduced self-esteem and group-esteem).

Those who feel their group is significantly discriminated against and tend to reduce their identification with the group in order to protect their sense of self-esteem, tend to do so by approaching the object that harmed their group over time.

“The research findings deepen our understanding of how identity threats affect responses in advertising contexts and highlight the ethical considerations brands must address when formulating campaigns,” explains Dr. Friedmann. “This research delves into the psychological complexity of identity regulation as a result of exposure to threatening content for consumers.”

Implications and Recommendations

The study results do not suggest that offensive-discriminatory advertising is an effective marketing strategy. Most participants exposed to this content did not demonstrate more positive attitudes or behaviors than those in the control group; rather, it was a specific limited group of people who reacted positively to it. On the contrary, such advertisements can exact a significant psychological toll on individuals belonging to discriminated groups. These findings reinforce the importance of adopting an ethical approach to identity-based marketing and avoiding tactics that exploit social vulnerability for strategic profit.

In accordance with the study’s findings, the researchers recommend adopting an approach that involves enforcement and clear criteria to prevent harm to various population groups.

“Enforcement against offensive and discriminatory marketing is essential to protect the well-being of individuals and foster a more egalitarian society. As a society, we must develop specific criteria for controlling offensive advertisements, as is customary in the UK, and impose significant financial penalties on those who violate them,” concluded Dr. Friedmann.

The Research Team

The research team included: Eliran Solodoha from the Peres Academic Center, Sandra Maria Correia Loureiro from the University of Lisbon, and Lior Aviali, LBM Lab Manager, from Ben-Gurion University of the Negev.

Continue Reading
Advertisement
Advertisement

Like us on Facebook

Trending