hometechnology NewsEmployee level awareness key for companies to protect against cyberattacks, says expert

Employee-level awareness key for companies to protect against cyberattacks, says expert

Companies the world over are encouraging employees to be cautious of potential threats which may target endpoints. Ways to do this is by deploying effective end-point security, mobile security controls, user behaviour analysis and more.

Profile image

By Vijay Anand  Sept 22, 2022 3:14:23 PM IST (Updated)

Listen to the Article(6 Minutes)
3 Min Read
Employee-level awareness key for companies to protect against cyberattacks, says expert
No company, big or small, is safe from cyberattacks. No method of attack, unremarkable or ambitious, is off the table. This past weekend has, if anything, reinforced this notion, with the likes of Uber and Take-Two Interactive Software Inc being targetted by hackers.

While in Uber's case, an unspecified amount of data was stolen, Take Two's Rockstar Games was compromised and three gigabytes of data, including over 90 videos of the highly anticipated, under-development Grand Theft Auto VI, was stolen. The stolen data also includes source code of GTA VI and the wildly popular GTA V.
Meanwhile, on Wednesday, Take Two's other game developer, 2K Games, had its help desk compromised, with the company issuing a public appeal for its users not to click on any link sent from their official account.
Given all this, how does a company secure its data? Rockstar Games, perhaps, could have benefited by following the zero-trust philosophy, but there really isn't any single way to keep yourself safe when hackers are becoming bolder and more innovative.
According to Kunal Bajaj, Chief Business Officer at eSec Forte Technologies, the most basic way to protect data is by raising awareness among a company's employees.
"Companies the world over are encouraging their employees to be cautious of potential threats which may target the endpoints. Ways to do this is by deploying effective end-point security, mobile security controls, user behaviour analysis and more," Bajaj said.
He added, in addition to all these, many companies are integrating flexible technologies and modular approaches so as to reduce exposure and decrease reaction time.
In Rockstar's case, the hack was a simple case of data theft, even though the hacker, who went by "Tea Pot", told Rockstar they were ready to negotiate, failing which they would release the game's source code.
Bajaj continued, a weak framework on cybersecurity often leads to instances of data theft. In Rockstar's case, the hacker accessed an unsecured Slack channel and got an employee to share secure access credentials.
"Organisations and individuals who are not serious about their privacy and data often fall prey to hackers and scammers," he elaborated. "Unprotected systems, weak passwords, and unawareness of cybersecurity laws are some other prominent factors that lead to data theft. In order to keep yourself safe from data theft, it is very essential to adopt a comprehensive data security policy, both as an individual and as an organisation," shared.
Another method to protect data is information security, Bajaj said. "Information security is a set of processes and tools that are deployed to protect sensitive information. But information security is a part of the cybersecurity framework and should not be used as a replacement for a wider and holistic cybersecurity," he added.

Most Read

Share Market Live

View All
Top GainersTop Losers
CurrencyCommodities
CurrencyPriceChange%Change