Normal view

There are new articles available, click to refresh the page.
Today — 17 June 2024Main stream

Don’t Be a Sitting Duck: The Cybersecurity Checklist You Need Right Now

Cybersecurity Checklist

A cybersecurity checklist is essential for strengthening the security of both personal devices and corporate networks in today's digital landscape. While primarily geared towards businesses ensuring cyber safety for their employees and workplaces, these measures are equally crucial for individual device security. This checklist outlines fundamental practices to safeguard against evolving cyber threats, ensuring proactive defense strategies are in place.

Must-have Cybersecurity Checklist

1. Data Encryption

Data encryption converts sensitive information into a coded format, rendering it unreadable to unauthorized users. This security measure ensures confidentiality and compliance with privacy regulations. Even if attackers gain access to encrypted data, they cannot decipher it without the correct decryption key, thereby maintaining data integrity.

2. Disaster Recovery Policy

A disaster recovery policy is vital for organizations to respond to and recover from cyberattacks or system failures swiftly. It includes procedures for data restoration, minimizing downtime, and ensuring business continuity. Regular updates and drills ensure readiness to handle emergencies effectively.

3. External Hard Drive Backup

Maintaining backups on an external hard drive provides an offline data redundancy solution. This practice safeguards critical data independently from primary systems. In scenarios like ransomware attacks or network failures, offline backups facilitate quick data restoration, complementing cloud-based backups.

4. Updated Software

Regularly updating software is critical to patch known vulnerabilities that cybercriminals exploit. Updates not only enhance security but also improve software functionality and performance. Neglecting updates leaves systems vulnerable to cyber threats and compromises overall system integrity.

5. Cybersecurity Insurance

Cybersecurity insurance offers financial protection against losses resulting from cyber incidents. It covers expenses such as investigation costs, legal fees, and mitigation efforts. This insurance serves as a safety net, ensuring businesses can recover and resume operations following significant cybersecurity events.

6. Antivirus Updates

Frequent updates to antivirus software are essential to defend against emerging malware threats. Updated antivirus solutions detect and block malicious activities, enhancing overall system security. Continuous updates ensure systems are protected against evolving cyber threats.

7. Principle of Least Privilege

Implementing the principle of least privilege limits user access rights to only what is necessary for their roles. This mitigates the risk of insider threats and unauthorized access, maintaining control over system configurations and enhancing overall security posture.

8. Secure Connections

Secure connections, often facilitated by VPNs (Virtual Private Networks), encrypt data during transmission over public or unsecured networks. This practice prevents interception and unauthorized access to sensitive information, ensuring data confidentiality and integrity.

9. Robust Firewall

A robust firewall acts as a barrier between trusted internal networks and external networks, filtering incoming and outgoing traffic. It blocks malicious traffic and unauthorized access attempts, safeguarding network infrastructure and sensitive data from cyber threats.

10. Cybersafety Policies

Establishing comprehensive cybersafety policies is crucial for promoting cybersecurity awareness and best practices among employees. These policies cover password guidelines, internet usage protocols, and email security measures. Regular training reinforces these policies, reducing vulnerabilities to phishing attacks and unauthorized access attempts.

Conclusion

This cybersecurity checklist encompasses essential measures to prepare against potential cyber threats. It emphasizes proactive strategies both online and physically, including the use of external hard drives for backups and the implementation of robust cybersecurity policies. By adopting these practices, individuals and organizations can enhance their resilience against the evolving landscape of cyber threats. In a world where cybersecurity threats are increasingly prevalent, implementing these checklist points is crucial. We at The Cyber Express hope this guide has been informative and encourages widespread adoption of these cybersecurity best practices for a safer digital environment.
Before yesterdayMain stream

Post Office campaigner Alan Bates knighted in king’s birthday honours

14 June 2024 at 17:30

Ex-post office operator recognised for exposing Horizon IT scandal, while Tracey Emin becomes a dame and Gordon Brown a companion of honour

The Post Office campaigner Alan Bates has been knighted in the king’s birthday honours in recognition of his role in exposing the Horizon IT scandal, one of the worst miscarriages of justice in British history.

The former post office operator and founder of the Justice for Sub-postmasters Alliance said he was accepting the honour “on behalf of the group” of branch operators and the “horrendous things that had happened to them.”

Continue reading...

💾

© Photograph: Lucy North/PA

💾

© Photograph: Lucy North/PA

Arise, Sir Cav: Mark Cavendish awarded knighthood in king’s birthday honours

14 June 2024 at 17:30
  • Chris Boardman gets CBE as does Graeme Souness
  • Katherine Sciver-Brunt and Sandy Lyle earn OBEs

The British cyclist Mark Cavendish, whose fearlessness, raw power, and insatiable thirst for success has earned him 164 professional victories in a glittering career, has been knighted in the king’s birthday honours.

The 39-year-old, who is known as the Manx Missile because of his speed and aggressiveness in sprint finishes, has also won 34 Tour de France stages, putting him joint first on the all-time list together with Eddy Merckx.

Continue reading...

💾

© Photograph: Jennifer Lorenzini/Reuters

💾

© Photograph: Jennifer Lorenzini/Reuters

London Stock Exchange CEO honoured in king’s birthday list

14 June 2024 at 17:30

Julia Hoggett awarded damehood for services to business, while HSBC chair Mark Tucker receives knighthood

Business live – latest updates

The head of the London Stock Exchange (LSE) and the chair of HSBC are among the business leaders to be recognised this year in King Charles’s birthday honours list.

Julia Hoggett, a former banker who has been the chief executive of the London Stock Exchange since 2021, has been awarded a damehood for her services to business and finance.

Continue reading...

💾

© Photograph: James Manning/PA

💾

© Photograph: James Manning/PA

Digital manipulation with surreal consequences...

11 June 2024 at 06:38
"Lissyelle is a photographer and art director based in Brooklyn, New York and Los Angeles, California. She grew up in rural Ontario where her interest in photography began at the age of 12, spurred by an obsessive fear she would one day forget her entire life were she not to document it. Her body of work is often still inspired by this compulsion to photograph, as well as by the vivid colors of early childhood, reoccurring dreams, the blurry way we see things when we are either too happy or too sad, and the soft hands of the high renaissance." [NSFW]

At home with the pronatalists

By: Wordshore
25 May 2024 at 11:29
[CW: eugenics, racism, violent child abuse incident] Guardian: "His little brother, two-year-old Torsten Savage, is on his iPad somewhere upstairs. Simone, 36, in an apron that strains across her belly, has her daughter, 16-month-old Titan Invictus, strapped to her back. The imminent arrival of their fourth child, a girl they plan to name Industry Americus Collins, turns out to be only the first in a string of surprises – and one really shocking thing – that I will encounter during my day with the pronatalists." [Previously: November 2022, You say 'Eugenics' like it's a bad thing (it is)]

Predator spyware vendor banned in US

7 March 2024 at 08:20

The US Treasury Department has sanctioned Predator spyware vendor Intellexa Consortium, and banned the company from doing business in the US.

Predator can turn infected smartphones into surveillance devices. Intellexa is based in Greece but the Treasury Department imposed the sanctions because of the use of the spyware against Americans, including US government officials, journalists, and policy experts.

Under Secretary of the Treasury for Terrorism and Financial Intelligence Brian E. Nelson said:

“Today’s actions represent a tangible step forward in discouraging the misuse of commercial surveillance tools, which increasingly present a security risk to the United States and our citizens.”

Since its founding in 2019, the Intellexa Consortium has marketed the Predator label as a suite of tools created by a variety of offensive cybercompanies that enable targeted and mass surveillance campaigns.

Predator is capable of infiltrating a range of electronic devices without any user interaction (known as ‘zero-click’). Once installed, Predator deploys its extensive data-stealing and surveillance capabilities, giving the attacker access to a variety of applications and personal information on the compromised device. The spyware is capable of turning on the user’s microphone and camera, downloading their files without their knowledge, tracking their location, and more.

Under the sanctions, Americans and people who do business with the US are forbidden from transacting with Intellexa, its founder and architect Tal Dilian, employee Sara Hamou and four of the companies affiliated with Intellexa.

Sanctions of this magnitude leveraged against commercial spyware vendors for enabling misuse of their tools are unprecedented, but the US has expressed concerns about commercial spyware vendors before.

“A growing number of foreign governments around the world, moreover, have deployed this technology to facilitate repression and enable human rights abuses, including to intimidate political opponents and curb dissent, limit freedom of expression, and monitor and target activists and journalists.”

In July 2023, the US Commerce Department’s Bureau of Industry and Security (BIS) added Intellexa and Cytrox AD to the Entity List for trafficking in cyber exploits used to gain access to information systems. Cytrox AD is a North Macedonia-based company within the Intellexa Consortium and acts as a developer of the consortium’s Predator spyware.

The Entity List is a trade control list created and maintained by the US government. It identifies foreign individuals, organizations, companies, and government entities that are subject to specific export controls and restrictions due to their involvement in activities that threaten US national security or foreign policy interests.

Earlier this month, a California federal judge ordered spyware maker NSO Group to hand over the code for Pegasus and other spyware products used to spy on WhatsApp users.

While you’ll see Predator and Pegasus usually deployed in small-scale and targeted attacks, putting a stop to the development and deployment of spyware by these commercial entities is good news for everyone.

How to remove spyware

Because spyware apps install under a different name and hide themselves from the user, it can be hard to find and remove them. That is where Malwarebytes for Android can help you.

  1. Open Malwarebytes for Android and navigate to the dashboard
  2. Tap Scan now
  3. It may take a few minutes to scan your device, but it will tell you if it finds spyware or any other nasties.
  4. You can then uninstall the app.

We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.

❌
❌