Leveraging Greater Social Engagement for Improved Cyber Hygiene

Cisco | May 19, 2020

  • Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence.

  • Practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues.

  • There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks.


You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues. For example, despite the fact that we may be aware that using the same user ID or email account and password, for different cloud services, is considered risky behavior, and could result in a potential account hack or data breach, yet we do not change this behavior. How often do you share your best practices for securing your devices, cloud service applications, mobile applications and home networking equipment for connecting to the Internet with those around you in a social situation or manner?


Do you recommend the use of available security settings to those around you in your social circles? Do you show them how to quickly implement the security settings? In this article we discuss some ways for improving cyber hygiene. Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. It’s worth to keep an eye out for the research going on regarding social cybersecurity, because it may have some answers to getting people and companies to better protect themselves.



Learn more: CORONAVIRUS-THEMED CYBERATTACKS ON BUSINESSES RISE, EXPERTS RECOMMEND BEEFING UP NETWORK SECURITY
 

“Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves.”

~ Stan Mierzwa, Director


Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves. There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks. This ranges from ensuring you install and keep your anti-virus or endpoint protection system up to date, apply software security updates, encrypt sensitive data, backup our important data, and this list can continue to grow.

“Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk.”


Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk. The Human-Computer Interaction Institute at Carnegie Mellon University and other researchers are bringing focus to this new scientific area of cybersecurity. As their website (www.socialcybersecurity.org) mentions, this group is leveraging insights from social psychology and other fields to develop novel interventions and strategies for nudging adoption of expert-recommended tools and practices. Can we leverage social interactions or the influence of social situations to enhance our cyber hygiene or help thwart cyber threats?


The research results from interviews done provided a theme that the observability of security feature usage was a key enabler of socially triggered behavior change and conversation – in encouraging the spread of positive behaviors, discouraging negative behaviors, and getting participants in the study to talk about security. The work presented is innovative and brings encouragement and opportunities in how systems can be designed to encourage better cybersecurity behaviors. One can also think of Social Cybersecurity in contrast and comparison to the criminological theory called “Social Learning Theory”. In Social Learning theory, delinquents are likely to engage in deviant or criminal behavior when those actions have been positively reinforced.


Learn more: PHISHING ATTACKS DISGUISED AS FAKE CERT ERRORS ON CISCO WEBEX USED TO STEAL USER CREDENTIALS
 

Spotlight

Secure & Manage Your Privileged Accounts - IBM Security Secret Server. With IBM Security Secret Server, organizations gain full control over which users have access to which privileged credentials, and how they can use those credentials.

Spotlight

Secure & Manage Your Privileged Accounts - IBM Security Secret Server. With IBM Security Secret Server, organizations gain full control over which users have access to which privileged credentials, and how they can use those credentials.

Related News

DATA SECURITY

Secure Cyber Defense Growing Its Miamisburg Operations With JobsOhio Support

businesswire | December 14, 2020

Secure Cyber Defense declared it will develop its Miamisburg tasks, adding 16 new workers throughout the following three years to help ensure organizations against digital assaults. JobsOhio gave the organization a $75,000 Workforce Grant to help the extension, which will build finance by $1.3 million. “At the start of 2019, we solidified our relationship with industry-leading cybersecurity technology company Fortinet. As our relationship with Fortinet has grown, we now have the ability to serve larger more complex enterprise companies with advanced technology, cybersecurity monitoring and analysis, and incident response capabilities. Growing our cybersecurity expertise and adding new team members will allow us to take advantage of these growth opportunities,” says Shawn Waldman, CEO of Secure Cyber Defense. Secure Cyber Defense keeps on developing as the requirement for improved network safety has expanded. Innovation organizations keep on battling to discover qualified engineers and investigators with network protection experience. The JobsOhio Workforce Grant guarantees organizations like Secure Cyber Defense can recruit and prepare talented online protection specialists. The expanding need for particular aptitudes makes proficient open doors in the quickly developing industry network safety field. “Every company in today’s digital world has to create a secure cyber environment and needs skilled cyber talent to guard their digital assets,” said Julie Sullivan, DDC Executive Vice President of Regional Development. “We’re excited Secure Cyber Defense is growing their operations here in the Dayton Region and adding jobs in this exciting and challenging field. The work they do highlights the region’s strength in cyber and digital transformation.” About Secure Cyber Defense: Located in Miamisburg, Ohio, Secure Cyber Defense is a Managed Security Services Provider for government agencies, education, manufacturing and financial service companies. The company provides continuous cybersecurity monitoring, analyzing digital environments for possible attacks to identify, prevent and respond to cyber threats. Utilizing Fortinet technology, vulnerability assessments, incident response planning, and expert continuous monitoring services, Secure Cyber Defense has the ability to scale custom solutions for any size organization. Secure Cyber Defense is an Advanced Fortinet Partner.

Read More

DATA SECURITY

NETSCOUT Omnis Cyber Intelligence Integrates with AWS Security Hub

NETSCOUT | November 11, 2021

NETSCOUT SYSTEMS, INC. a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced that Amazon Web Services, Inc. (AWS) customers will now have added visibility and security when migrating workloads to AWS using NETSCOUT's Omnis® Cyber Intelligence (OCI) integration with AWS Security Hub. NETSCOUT OCI is the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies threats early in the attack life cycle to prevent infections from spreading, stops future attacks, and identifies compromised assets. As a cloud security posture management service, AWS Security Hub performs automated, continuous security best practice checks against AWS resources, aggregates alerts, and enables automated remediation. The integration between NETSCOUT OCI and AWS Security Hub enhances the corporate security posture by extending the breadth and depth of cyberthreat visibility and intelligence. The integration is seamless since NETSCOUT OCI automatically formats violations in the Amazon Security Findings Format (ASFF) with built-in intelligence to suppress duplicate alerts and group them as needed. NETSCOUT OCI, through its integration with AWS Security Hub, helps detect, investigate, and respond to potentially malicious activity exposing risks that exist in hybrid cloud interdependencies. "As organizations migrate workloads to the cloud, their infrastructure becomes increasingly complex, making end-through-end visibility a necessity to uncover increased attack surfaces and combat threat exposure,As an AWS Validated Technology and Public Sector Partner with Network and Migration competencies, we've been in lock-step development with AWS. We're excited that customers can realize the benefits of NETSCOUT OCI, which is now fully integrated onto AWS Security Hub." Russ Currie, vice president, enterprise strategy, NETSCOUT About NETSCOUT NETSCOUT SYSTEMS, INC. helps assure digital business services against security, availability, and performance disruptions. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Omnis Cyber Intelligence delivers the fastest and most scalable network security solution available on the market. NETSCOUT nGenius service assurance solutions provide real-time, contextual analysis of service, network, and application performance. And Arbor® Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers or in the cloud, and how NETSCOUT's security and performance solutions can help you move forward with confidence.

Read More

DATA SECURITY

SafeGuard Cyber provides Telegram users with first and only security and compliance solutions.

prnewswire | November 12, 2020

Shield Cyber, the main SaaS stage committed to dealing with the full lifecycle of computerized hazard assurance, today declared it presently conveys mechanized network safety and consistence controls for Telegram, the quick, basic, and free cloud-based informing application supported by monetary administrations and cryptographic money firms for business interchanges. More organizations are going to versatile applications to complete work in manners that offer the least grating, particularly since the start of the COVID pandemic. Among these, Telegram has been a top pick of problematic monetary administrations and cryptographic money firms for its effortlessness, speed, adaptability, and inherent encryption. The application additionally bolsters organizations with the capacity to have gatherings of up to 200,000 clients, with help for photographs, recordings, and documents of any kind. Accordingly, Telegram has arisen in these enterprises as a favored option in contrast to Facebook-claimed WhatsApp. "We serve a number of innovative financial services firms around the world that have embraced apps like Telegram," said SafeGuard Cyber CEO and Co-founder Jim Zuffoletti. "They're disrupting the finance sector, including how agile and responsive they can be in business communications." Be that as it may, even scrambled portable talk channels are dependent upon security and administrative consistence concerns. Business interchanges stay powerless against skewer phishing, ransomware, and digital surveillance assaults. Monetary firms are additionally searching for approaches to diminish consistence hazards and guarantee lawful preparation. Shield Cyber's new arrangement tends to these worries by expanding the stage's honor winning security and information misfortune anticipation abilities to Telegram messages. Organizations will presently have the option to catch Telegram content progressively, apply strategies, and naturally isolate messages that present information misfortune or consistence hazards. "We recently surveyed more than 600 IT and security professionals and found the biggest security and compliance challenge is the use of unsanctioned apps," noted Otavio Freire, CTO and Co-founder of SafeGuard Cyber. "We're proud to give security and compliance teams at digital currency and new financial services providers a scalable solution to enable Telegram as a sanctioned channel. This new capability continues our mission of securing human connections no matter what digital channel they're in." About SafeGuard Cyber SafeGuard Cyber is a Charlottesville, Virginia-based company with a cloud-based platform that empowers organizations to use social media and digital channels securely, compliantly, and at the scale of global business. With coverage across more than 50 channels, SafeGuard Cyber helps security, compliance, and marketing teams work better together to drive business forward.

Read More