Al-Jasser: work is underway to restructure and develop aviation infrastructure    Diriyah to host third IMFC Deputies meeting under Saudi chairmanship    15,135 decisions taken to penalize Saudis and expats for violations    Saudi-European Parliamentary Friendship Committee discusses cooperation during Strasbourg visit    Saudi stock market loses half a trillion riyals, with Aramco's losses amounting to SR340 billion Tariff turmoil rattles Gulf markets    KAU to host Digital Communication Conference in Jeddah from April 29 to May 1    TGA: Riyadh tops with 45% of 290 million orders delivered in 2024    Aja and Salma mountains draw nature lovers to Hail's rugged landscapes    US revokes all visas for South Sudanese nationals over deportation dispute    Death toll from Myanmar earthquake rises to 3,471    Macron to hold Gaza summit with Egypt and Jordan in Cairo    Benzema rescues Al Ittihad with stoppage-time equalizer in thrilling Jeddah Derby    Al Qadsiah and Al Ettifaq share spoils in tense Eastern Derby stalemate    Moussa Diaby praises Al Ittihad's resilience after Jeddah Derby draw "When you can't win, you take a point"    Saudi assistant referee Iman Al Madani joins AFC elite list for 2025    Riyadh Art Week launches with over 50 galleries showcasing global artistic dialogue    Turki Al-Sheikh announces five new Saudi film projects to be produced in Riyadh    Saudi Ministry of Education to showcase innovations at 2025 Geneva International Exhibition    Ed Sheeran weaves Persian music into new song, Azizam    Veteran Bollywood actor Manoj Kumar dies at 87    Screen time in bed linked to insomnia, study finds    Bollywood actress vindicated over boyfriend's death after media hounding    Grand Mufti rules against posting prayers and preaching in mosques on social media    King Salman prays for peace and stability for Palestinians in Ramadan message King reaffirms Saudi Arabia's commitment to serving the Two Holy Mosques and pilgrims    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Cybersecurity is a puzzle, make sure you have all the pieces
Published in The Saudi Gazette on 31 - 12 - 2020

Spare a thought for the modern CISO. The global cybercrime industry has been in overdrive since the start of the year, as threat actors capitalise on the disruption brought by the coronavirus pandemic.
The Mimecast Threat Centre found a dramatic increase in cyberattacks during the first 100 days of the pandemic. In Middle East and North Africa, spam attacks increased by 36% and malware by 22%.
Cybersecurity is a ‘complex puzzle'
To protect against these threats, organizations are having to build complex, multi-layered security strategies that safeguard customers, employees, and company data. The sheer volume of threats and the abundance of attack vectors makes effective cybersecurity a complicated puzzle.
In many cases, organizations have no clear idea of how to put those puzzle pieces together in an effective way. Encouragingly, 82% of organizations surveyed in the UAE and Saudi Arabia in Mimecast's State of Email Security 2020 report, say they have a cyber resilience strategy or are actively rolling one out.
Yet, 67% of respondents still believe it's inevitable or likely they will suffer from an email-borne attack in the coming year. This begs the question; do they have all the right measures in place to fully protect their organization and be totally resilient?
What are the pieces of the cybersecurity puzzle? In our experience, the following four elements can add up to a holistic cybersecurity strategy that protects customers, employees, and data from exploitation:
Visibility
Without visibility over employees, data, and your online brand, building an effective cybersecurity strategy is a bit like building a puzzle in the dark. Threat intelligence can play a vital role by providing insight into how organizations are targeted, what cyber threats have been blocked and why, which employees are the riskiest and what actions to take to optimise the broader cybersecurity strategy.
However, visibility should extend beyond the perimeter of the organisation. The speed at which cybercriminals can imitate brands online, makes it easy to launch sophisticated attacks using lookalike domains that can easily trick customers, partners, and employees.
Tools such as DMARC, are effective and an essential piece of the puzzle, but only for protecting domains already owned by the organization, against email brand exploitation. Supplementing DMARC with tools that protect against online brand exploitation can help identify attack patterns at the preparation stage and block compromised assets before they turn into live attacks.
To fully protect a brand, an organization should consider implementing DMARC along with brand exploitation tools, managed from one integrated system that provides both visibility and proactive remediation.
Resilience
All organizations regardless of size are at risk of cyberattack. While defenses are important, being able to quickly recover from a successful attack is just as vital.
Unplanned outages — such as those typical in cloud services such as Microsoft365 — can also disrupt business and lead to losses in productivity, revenue, and reputation. The State of Email Security report found that 60% of organizations in UAE and KSA experienced an Microsoft365 outage in the last 12 months.
Email is still the most widely used business tool and email continuity solutions provide guaranteed access to email, from anywhere and on any device even when email servers fail. Cloud archiving can further help keep corporate knowledge available despite disruptions. And specialized sync-and-recover tools can fill data recovery gaps for those instances where data is corrupted or deleted - whether intentionally or by accident.
Culture
Cybersecurity is at its most effective when every employee understands their role in protecting the organization — and themselves — from attacks. Organizations should seek to instil a culture of cybersecurity awareness that permeates from the top to the bottom of the organization.
Micro-learning together with engagement is the key. Ongoing training that is short, relatable, memorable and that regularly reinforces key concepts works. We know this, because during lockdown periods across the world, Mimecast researchers found that users in organizations that had Mimecast awareness training were 5 times less likely to fall prey to social engineering attacks than those that did not.
Management teams should be ready to take swift action in the wake of a data breach, to ensure the threat is contained, damage mitigated, and the organisation is not at risk of non-compliance to prevailing regulations.
Compliance
While the UAE does not have a comprehensive data protection law at its federal level, there are laws in place that govern privacy and data security. Sector-specific data protection provisions exist for certain laws, while three special economic or sector free zones have specific data protection laws. These data protection laws keep UAE organizations accountable, placing them under pressure to protect customer data.
Both data management and data protection are key elements in achieving compliance. It is difficult for an organisation to achieve data management compliance with unstructured data like email. What's key is to have a third party, independent and immutable data repository that complies to regulatory standards and mitigates legal risks.
The importance of data security and protection is elevated with financial and criminal penalties. Organisations also need to consider the brand damage that is associated with data breaches. Email remains the number 1 attack vector for cyber-attacks. It is widely reported that 91% of all attacks start with an email, with some not even requiring malware.
Call for greater awareness, effort
There is no silver bullet when it comes to security, even when it comes to protecting against a specific attack — like phishing. The entire ecosystem needs to take security seriously or everyone remains at risk.
Protecting your brand and customers with solutions like DMARC and tools that prevent brand impersonation online is important. But if the organization at the receiving end of a phishing email does not have protections in place, they could fall victim to an attack.
Ultimately, the entire business world needs to prioritise security and protect each other. The first step is to consider managing security solutions and resilience tools in an integrated system that helps reduce cost and complexity, and ultimately enhances the broader security ecosystem.
— The writer is cybersecurity expert at Mimecast


Clic here to read the story from its source.