Dealing with the new world of cyber risk

Smart Cybersecurity Handbook 2022 Access Control & Identity Management

With more people connecting to digital platforms given the events of the past two years, breaches on social networking sites like LinkedIn, Facebook and Instagram have become commonplace. Social engineering and password hacks are increasingly sophisticated with any individual or company, regardless of size, country, or industry sector, now a target.


Richard Frost.

Fortunately, consumers are starting to become more cybersecurity savvy. Recent memes highlighting the risk of sharing information like your first dog, car, celebrity crush and so on, which hackers can use to build up a profile of their intended victim have certainly helped in this regard. But even so, people are still falling prey to social engineering attacks based on what they share on LinkedIn, Facebook and Instagram.

Social media dangers

It has become too easy for people to live public lives using social media. They share photographs of their kids on their first day of school; they share location-based info on where they are currently vacationing and they make their profiles public to anyone who can search for their names on a social site.

This either means that most people have innocent mindsets or simply do not care about what they share online. But this is no longer good enough. For instance, consumers must start creating circles of trusted friends on Facebook with whom they share information. They must also start thinking more about what they post online. A great way to test this is for a person to think about their content from a hacker’s mindset. Most of us will be in for a rude awakening.

For their part, organisations must start profiling their senior executives for social engineering and see what information they have made publicly available online.

Rethink passwords

And while most people know that it is important to use different passwords for different sites, very few do so. Furthermore, how many people can honestly say they log out from their social accounts or log off from their computer when they are done using them?

Good password hygiene includes creating difficult passwords with 16 characters or more. People should also not use common words in a row and can swap out vowels for numbers. Add in a few special characters and encrypt the password for good measure.

This is where password managers are great tools in this regard. These can automatically create sufficiently advanced passwords for each site. The user simply needs to remember the master password to access the solution.

But even that is not sufficient. If the files on a hard drive are not encrypted, a hacker can simply rip the drive out and plug it into another machine to bypass all passwords, pins and biometric access controls.

Verify yourself

Heading into 2022, we will start seeing biometrics becoming more accepted as the means to safeguard devices and data. Combine that with a Zero Trust approach where people will not trust anyone until they can prove they are who they say they are and the environment will automatically become more secure.

Artificial intelligence and machine learning will also be used to build up patterns of user behaviour to protect systems. For example, if you are logging in to your online banking profile in Johannesburg and 20 minutes later a login request from Russia takes place, access will automatically be blocked.

Multi-factor authentication and one-time passwords, while frustrating to some as they create additional steps in the process, will also become more prevalent. Ultimately, the password landscape of the future will be one where a combination of tools and strategies will be used to protect people and companies.

Of course, for this to work, users must also learn how to best manage the content they post online for all to see. Rethink your cyber stance, use different passwords for different sites, think zero trust – and don’t become a victim of yours or someone else’s mistakes.

For more information contact Vox, +27 87 805 0000, [email protected], www.vox.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is the smoke beginning to clear for password security?
Access Control & Identity Management Security Services & Risk Management
The password problem is the result of bad habits, and they can be hard to break. But ask anyone that has done it and they will not tire of telling you the benefits.

Read more...
Solving coworking front-desk drama
Access Control & Identity Management Products
Flexible, shared and coworking offices have taken off with great success, but because occupational churn is high, the front-desk can be a difficult place to manage.

Read more...
Powder coating provides durable finish
Turnstar Systems Access Control & Identity Management Industrial (Industry)
Turnstar’s powder coating line provides corrosion resistance, high-quality surface finishing and a long-term environment-friendly impact for all access control components the company manufactures.

Read more...
Home automation hangs on security
Technews Publishing Vox ET Nice Editor's Choice
Home automation is poised for growth and is offering security companies many opportunities to develop open systems that integrate security and non-security products in one easy-to-manage platform.

Read more...
Salient Systems manages campus security
Education (Industry) CCTV, Surveillance & Remote Monitoring Access Control & Identity Management
The University of Massachusetts Amherst relies on Salient Systems for video, access control operations for flagship campus as it standardises on IP surveillance.

Read more...
From physical to virtual IDs
Access Control & Identity Management
The future of sovereign documents (IDs) such as identity cards, passports and driver’s licences is virtual, however, there are still some key challenges to overcome in order to get there.

Read more...
QR Code passwordless authentication method
News Access Control & Identity Management Products
LogMeOnce introduces a patented QR Code passwordless authentication method allowing users to scan a code with their mobile device for secure authentication.

Read more...
Improving biometrics to address privacy, scale and accuracy
Editor's Choice Access Control & Identity Management News
CryptoNets uses artificial intelligence and a new type of encryption; it is very fast, locating a face among countless others in milliseconds without the need to have any other data to narrow the search.

Read more...
Integration relieves PoPIA pressure for estates
Access Control & Identity Management
ATG Digital has announced that its flagship product, At The Gate, is available as an add-on to the EstateMate community management app.

Read more...
Web-based access control
Regal Distributors SA ZKTeco Access Control & Identity Management
Managed over the cloud, ZKBioSecurity is the access control solution that ensures total control over all entrances, exits, internal doors, gates and turnstiles, and more.

Read more...