Dealing with the new world of cyber risk

Smart Cybersecurity Handbook 2022 Access Control & Identity Management

With more people connecting to digital platforms given the events of the past two years, breaches on social networking sites like LinkedIn, Facebook and Instagram have become commonplace. Social engineering and password hacks are increasingly sophisticated with any individual or company, regardless of size, country, or industry sector, now a target.

Richard Frost.

Fortunately, consumers are starting to become more cybersecurity savvy. Recent memes highlighting the risk of sharing information like your first dog, car, celebrity crush and so on, which hackers can use to build up a profile of their intended victim have certainly helped in this regard. But even so, people are still falling prey to social engineering attacks based on what they share on LinkedIn, Facebook and Instagram.

Social media dangers

It has become too easy for people to live public lives using social media. They share photographs of their kids on their first day of school; they share location-based info on where they are currently vacationing and they make their profiles public to anyone who can search for their names on a social site.

This either means that most people have innocent mindsets or simply do not care about what they share online. But this is no longer good enough. For instance, consumers must start creating circles of trusted friends on Facebook with whom they share information. They must also start thinking more about what they post online. A great way to test this is for a person to think about their content from a hacker’s mindset. Most of us will be in for a rude awakening.

For their part, organisations must start profiling their senior executives for social engineering and see what information they have made publicly available online.

Rethink passwords

And while most people know that it is important to use different passwords for different sites, very few do so. Furthermore, how many people can honestly say they log out from their social accounts or log off from their computer when they are done using them?

Good password hygiene includes creating difficult passwords with 16 characters or more. People should also not use common words in a row and can swap out vowels for numbers. Add in a few special characters and encrypt the password for good measure.

This is where password managers are great tools in this regard. These can automatically create sufficiently advanced passwords for each site. The user simply needs to remember the master password to access the solution.

But even that is not sufficient. If the files on a hard drive are not encrypted, a hacker can simply rip the drive out and plug it into another machine to bypass all passwords, pins and biometric access controls.

Verify yourself

Heading into 2022, we will start seeing biometrics becoming more accepted as the means to safeguard devices and data. Combine that with a Zero Trust approach where people will not trust anyone until they can prove they are who they say they are and the environment will automatically become more secure.

Artificial intelligence and machine learning will also be used to build up patterns of user behaviour to protect systems. For example, if you are logging in to your online banking profile in Johannesburg and 20 minutes later a login request from Russia takes place, access will automatically be blocked.

Multi-factor authentication and one-time passwords, while frustrating to some as they create additional steps in the process, will also become more prevalent. Ultimately, the password landscape of the future will be one where a combination of tools and strategies will be used to protect people and companies.

Of course, for this to work, users must also learn how to best manage the content they post online for all to see. Rethink your cyber stance, use different passwords for different sites, think zero trust – and don’t become a victim of yours or someone else’s mistakes.

For more information contact Vox, +27 87 805 0000, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Gallagher launches Tech Talk
Gallagher News Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher has announced the launch of its new Security in Focus podcast series called Tech Talk, hosted by chief technology officer Steve Bell.

IDEMIA and Ideco demonstrate their value stacks
Technews Publishing Ideco Biometrics IDEMIA Conferences & Events Access Control & Identity Management News
Ideco and IDEMIA recently hosted a travelling show where attendees were given an update on the companies, as well as the full value stack they offer.

Paxton10 simplifies building security
Paxton Access Control & Identity Management
Paxton provides a single platform for access control and video management in Paxton10, its newest innovation that allows users to manage their facilities from one simple security system.

Have biometrics changed the way mines operate?
ZKTeco Mining (Industry) Access Control & Identity Management
The mining industry continues to improve conditions for mine workers, striving for zero harm, however, innovations which improve worker safety and increase operational efficiency are still needed.

Adapting to the new normal
Access Control & Identity Management
SATEC (SA Technologies) had to develop a new strategy to enhance its current product features to align and adapt to market trends within the technology sector.

AI will drive the future of access control
Suprema Access Control & Identity Management
Artificial intelligence is driving changes previously in the realm of the imagination. AI-based voice recognition and image recognition enable machines to understand and recognise things better than humans are able to.

Powder coating provides durable finish
Turnstar Systems Access Control & Identity Management Industrial (Industry)
Turnstar’s powder coating line provides corrosion resistance, high-quality surface finishing and a long-term environment-friendly impact for all access control components the company manufactures.

Local makes lekker parking bay management technology
Access Control & Identity Management
South African born-and-bred technology platform Parket builds a seamless bridge between supply and the ever-increasing, but fluid – and often temporary – demand for parking bays.

Local innovation continues
BoomGate Systems Access Control & Identity Management
While having local manufacturing facilities presents its own set challenges in South Africa, Boomgate Systems makes full use of its in-house local manufacturing and R&D.

CathexisVision integrated with Suprema’s BioStar2
Technews Publishing News Access Control & Identity Management Integrated Solutions
This integration uses BioStar2 access control events to trigger automated actions on the CathexisVision system, including alerts, recording a camera and commands such as locking and unlocking doors, and clearing an alarm.