Survey Uncovers Poor Collaboration Between Network and Cybersecurity Professionals Leads to Data Security Breach
Hikvision Offers Cybersecurity Tips to Prevent Malware, Cyberattacks
New research uncovered that a lack of close collaboration between network and cybersecurity professionals across Canada and the U.S. led to increases in security breaches and/or data loss, according to an article in Canadian Security magazine.
The joint survey by BlueCat and International Data Group polled 200 network and cybersecurity professionals across Canada and the U.S.
“The challenge is that the network team’s mission is to ensure efficient and accurate traffic flow, while cybersecurity is tasked with inspecting suspicious traffic. … To ensure both the security and functionality of the network, it is imperative network and cybersecurity teams agree upon and manage their responsibilities with common processes, and shared, integrated platforms,” said BlueCat CEO Michael Harris, in the article.
Eighty-six percent of respondents claimed lack of collaboration contributed to loss of productivity, service downtime, cost increases, among security breach and other losses to the organization.
The study also unveiled that complete network visibility only existed for 37 percent of teams, which hampered their ability to partner together.
To read more about the research, visit Canadian Security online here.
Hikvision routinely offers cybersecurity tips to reduce security concerns on its website here.
Tips to Prevent Malware, Cyberattacks
In the blog, “Hikvision Cybersecurity Director Offers Top Five Tips On How To Prevent Malware, Cyberattacks,” Chuck Davis discusses malware, one of the most often used components in cyberattacks.
“Two of the most prevalent attack methods are, network scanning and phishing. A typical network scanning attack occurs when a system scans a network (frequently the Internet) looking for vulnerable systems. When it finds one, it will exploit the vulnerability and infect the system with malware. Often, the infected system will begin scanning and infecting systems as well. The second popular attack method is phishing. This is tricking someone into installing malware on their system or divulging information such as login credentials, and then infecting a system,” said Davis, in the article.
The blog provided these 5 tips to help integrators reduce vulnerabilities and prevent malware:
- Use firewalls and firebreaks (network segmentation): Place devices behind firewalls to protect them from untrusted networks, such as the Internet. And, use network segmentation—splitting a network into separate networks that are isolated, not connected.
- Protect your computer from vulnerabilities: Clean up your computer by removing old software programs no longer in use, and make sure to install patches regularly.
- Reset default passwords and use complex passwords: Users should be required to change any default passwords to a strong password with at least eight characters, and at least one of each of the following: numbers, special characters, and uppercase and lowercase letters.
- Manage your router: Earlier this year, the FBI recommended that everyone reboot all home routers and small office routers. In a previous blog on the subject, Davis stated that “rebooting will disable the active malware called “VPNFilter" which has infected hundreds of thousands of routers across the Internet …”
- Run active scans and updates: When a computer notifies you of an available update, run it immediately. In addition, you can actively run malware and vulnerability scans for network devices.
To read the entire article, click here.