Five ways to protect yourself from cyber-attack during consumer frenzy times

Issue 1 2022 Information Security

Throughout the year various events occur, such as the recent Valentine’s Day, Black Friday, Halloween, Christmas and so on, all of which prompt a massive increase in online buying as consumers mark the event by purchasing gifts, sending flowers etc. Over the years these events have become super commercialised through intense advertising campaigns aimed at pushing consumers to buy online.


Byron Horn-Botha.

Valentine’s Day has turned into a commercial celebration of romance, however, for this one celebration alone researchers at cybersecurity firm, Check Point, have revealed a darker side. Not surprisingly cybersecurity researchers reported a massive increase in malware attacks over the Black Friday weekend in November last year, with the number of websites attacked up to 50 times a day registering a jump of over 300%.

It will be interesting to see the statistics that emanate from this year’s Valentine’s Day, but it is reported that in the run-up to 14 February, 2021, cyber-attackers launched over 400 new Valentine's Day-themed phishing emails targeting innocent users every week – this represents a 29% increase on the previous year.

Hackers are now deploying a bigger-than-ever arsenal of scams, including phishing emails and fake e-greeting cards filled with malware, fake florist websites that steal credit card information and dozens of other ruses. What businesses need to do is to ensure that management and staff, at all levels, are security-savvy and not exposing the company to cyber breaches as they strive to get that bargain or send those flowers and gifts for special occasions.

Cybercriminals have long since worked out that most people are less guarded around holidays when they're feeling festive and also busy, so the bad actors escalate their attacks at these times. Lessons are there to be learned about being cybersecurity alert and they apply to these types of scenarios throughout the year. Staff need to be aware of the ways in which they can protect themselves and their company as they scour the net.

Five ways to protect your business from cyber-attack

1: Be on high alert during your high season

Company owners are well aware of the most critical times in their businesses. For example, if you run a pool-cleaning company the summer months are your peak period. The weeks and months before Christmas are make-or-break if you have a toy store and Easter and Halloween are your big seasons if you operate a sweet shop.

These are the times when your systems and data must be up, running and working smoothly. Whilst you know this only too well, so do hackers. They will use this knowledge to target your company when it is most vulnerable and extort the maximum ransomware payoff. Hackers understand that if they choose Valentine's Day to compromise the website of a flower chain, the chain will pay a hefty price to get its systems back up and running because every hour down is more money lost.

All businesses should be on high alert during their high season. You must ensure, at these times, that you have the protection necessary to thwart hackers. Your defences must be strong when you most need them.

2. Back up and encrypt your data

Offline backups and data encryption can play a crucial role in protecting your organisation from ransomware attacks. You should quickly restore any compromised systems if you have good offline backups. The backups also need to be offline because all your online connected drives will be locked up in the event of a ransomware attack.

Encrypting your sensitive data is also highly recommended. If attackers gain access to your critical assets, they won't be able to extort you if your data is securely encrypted.

3: Educate your employees

Almost 90% of security breaches are caused by human error. But a security-awareness training programme can effectively teach your employees what they need to know to prevent breaches, such as how to recognise those phishing emails that open the door for almost half of all ransomware attacks.

You can also help by reminding your workers to practice good cyber-hygiene, especially now that employees are often working remotely. Stress the importance of basic measures like backing up data on a consistent schedule and in multiple places. If workers are storing data primarily on a USB drive, remind them to back up that data on a hard drive or in the cloud. If they're storing data primarily in the cloud, remind them to save a copy offline.

4: Add MFA to your systems

Here are two stats to think about. 81% of breaches leverage stolen or weak passwords. One million passwords are stolen every week.

But you can protect against pilfered passwords with multi-factor authentication (MFA). It's one of the easiest and best ways to defend your business from a hack and it brings an extra, effective layer of security to your systems.

Adding a second authentication factor, such as Google Authenticator, is vital for protecting your accounts. Using a password wallet that stores all your passwords and creates long, complex passwords for each account is also recommended. Always, of course, make sure to turn on two-factor authentication for the password wallet account.

5: Test your defences

While it's essential to have a strong backup, it is just as crucial that you're able to recover lost data quickly and thoroughly. Ask yourself: are you able to do this? You can only be certain if you test. You should regularly test your backup copies to be sure they can reliably restore your data.

You should also test your security regularly. An excellent way to do this is with penetration testing. A pen test is a simulated attack on your business that evaluates the security of your IT infrastructure. Remember the average cost of a data breach is now estimated to be over $4 million so it is wise to invest in protection measures not only during these high profile, highly commercialised events, but throughout the year.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...