• About us
  • Disclaimer
  • Privacy Policy
Saturday, August 6, 2022
  • Login
  • Register
W-SE (Web - SEcurity)
  • Tech today
  • Security
    • Malware
    • Top list
  • Vulnerabilities
  • How To?
    • All
    • gaming
    • Smart phone
    • smart tv
    • software
    Tips for Buying the Perfect Travel Sim Card

    Tips for Buying the Perfect Travel Sim Card

    How to Write Farewell and Appreciate Messages

    How to Write Farewell and Appreciate Messages?

    Software help business

    Reasons to Buy the Right Business Hardware

    How to Invest in NFT Art?

    Ideal Internet Speed for Online Gaming

    Ideal Internet Speed for Online Gaming

    AceThinker Online Video Editor and Pro

    AceThinker Online Video Editor and Pro

    Trending Tags

    • Web Security
    • Data Security
    • Network Security
    • Cybersecurity
  • About us
  • Disclaimer
  • Privacy Policy
  • Contact
No Result
View All Result
  • Tech today
  • Security
    • Malware
    • Top list
  • Vulnerabilities
  • How To?
    • All
    • gaming
    • Smart phone
    • smart tv
    • software
    Tips for Buying the Perfect Travel Sim Card

    Tips for Buying the Perfect Travel Sim Card

    How to Write Farewell and Appreciate Messages

    How to Write Farewell and Appreciate Messages?

    Software help business

    Reasons to Buy the Right Business Hardware

    How to Invest in NFT Art?

    Ideal Internet Speed for Online Gaming

    Ideal Internet Speed for Online Gaming

    AceThinker Online Video Editor and Pro

    AceThinker Online Video Editor and Pro

    Trending Tags

    • Web Security
    • Data Security
    • Network Security
    • Cybersecurity
  • About us
  • Disclaimer
  • Privacy Policy
  • Contact
No Result
View All Result
W-SE (Web - SEcurity)
No Result
View All Result
Home Security

Emerging Threats During Emergency Times: Insights from Phil Jones at Airbus Cybersecurity

Melina Richardson by Melina Richardson
in Security
A A

The global pandemic has underscored the value of planning for the unexpected. Opportunistic criminals exploit constantly evolving work conditions and strained defense forces to cause a increase in attacks. Although there was no way to completely predict the effect on our organizations and be armed with a comprehensive plan from day one, there is plenty we can do to strengthen our resilience to emerging threats.

To address some of the key takeaways from the ongoing crisis, I spoke with Phil Jones, who has been managing Airbus Cybersecurity activities, an Airbus Defense and Space business unit since 2016. Phil now heads the group ‘s Cybersecurity Services sector that includes Managed Security Services, Security Advisory and Professional Services, and Integrated Security Services.

There are other types of attacks that organisations can anticipate in times of crisis?

We are currently seeing a revival of some classic cyber attacks such as brute force attacks on servers running Remote Desktop Protocol (RDP) or VPN platforms. Throughout recent weeks, these kinds of attacks have undergone three- to four-fold growth around the world.

Many companies have increased in their search to meet their employees’ remote work needs and have rapidly deployed new VPN or RDP applications without adopting the normal internal security testing procedures. Hackers have used this ability to access previously inaccessible information systems because of their configuration. Attackers can use open access platforms like Shodan with minimal effort, allowing them to search and locate connected objects and vulnerable machines with a free, unsafe RDP port over the Internet.

Organizations unable to perform “generalized” remote work are faced with a tenfold increased risk of sensitive data leakage. Employee bad practices, which use alternative approaches like non-corporate SaaS software or their personal resources and equipment in good faith, accentuate the “Shadow IT” effect and the lack of security team visibility monitoring.

There’s no special explanation for the types of attacks to alter during times of crisis, rather it’s the ability to manage them that is hindered. Indeed, security teams themselves have been increasingly working remotely during the COVID-19 timeframe and as a result their response capabilities have been compromised.

How do companies turn on current tools and processes to deal with threats as they emerge?

It is important to note that any organization, such as ISS hygiene, needs to have a minimum security base. It encompasses most cyber risks, and its reaction speed will rely, for example, on its ability to detect new threats in its environment through Security Operations Centres.

The company must retain some space for flexibility in order to be able to respond to new challenges while avoiding operating at 100 per cent efficiency. Creating “buffer capacity” may prevent the company from being overwhelmed immediately and may allow it to manage itself better in the event of an incident.

The company must adopt a versatile stance in non-crisis times, challenging its properties, tools , and processes to adapt – in the same way that threats develop and adapt. In reality, when dealing with new threats this is the biggest challenge – being able to constantly change and having teams with the skill, creativity and enthusiasm to learn and adapt.

Which are some of the errors that security teams make, you and your team?

We note that Attackers are commonly leveraging configuration errors. Configuration errors are common consequences of a-attack surface (Bring Your Own Phone, Mobile, Cloud, IoT, etc.) and organizations that are equipped with software and technology not yet mastered by them.

To minimize the risk of misconfiguration, it is important that the security teams deploy new IT services through an IT service management validation process that ensures compliance with previously defined requirements and verification of certain control points (configuration checklist) or even using technical auditors (slope auditors) for the most sensitive systems.

The company must be able to assign the required time to carry out implementation activities with due diligence and due care to make its IT personnel aware of cyber threats beforehand.

In a crisis coordination is paramount. On that front how do organizations improve?

Communication is one of the main factors in handling crises. Having a communication plan (internal and external to the organization) covering multiple cases of cyber-attacks is critical for the organization.

Therefore, crisis communication is a challenge, because it is a matter of being able to convey information through the right means (especially when traditional channels are unusable), the right elements, to the right recipients in a way that is easy to understand. Especially considering that information concerning the cyberattack can become viral (sometimes even at the initiative of the attacker who advertises it on the Internet) and cause credibility and identity harm greater than the material or financial damage caused by the cyberattack itself. The communication plan needs to be clearly defined and placed upstream to ensure, for example, that the communication team is in direct contact with the responding teams.

To evaluate its resilience, companies will use crisis management drills to check this technique at least once a year. Airbus CyberSecurity frequently conducts crisis management training activities for our clients. The aim is to ensure that the company is in the best position to make the right decisions at the right time and to respond appropriately when the time comes to execute the strategy. It refers to the areas of communications but even more generally, including technical elements such as emergency management and forensics.

 

ShareTweetShare
Previous Post

How to Buy Online Software at Best Price

Next Post

The Digital Future of Education, and the End of Snow Days

Melina Richardson

Melina Richardson

Melina Richardson is a Cyber Security Enthusiast, Security Blogger, Technical Editor, Certified Ethical Hacker, Author at Cybers Guards & w-se. Previously, he worked as a security news reporter.

Next Post
Error code

The Digital Future of Education, and the End of Snow Days

Please login to join discussion

Free Online Tools

Article Rewriter Pro
Grammar Checker Pro
Plagiarism Checker
Online Ping Website Tool
Website Screenshot Generator
Website Source Code Finder

Free A To Z IT Tools Online

Free IT Tools Online
  • Trending
  • Comments
  • Latest
inurl technology

Latest Carding Dorks List for Sql Injection 2022

March 16, 2022
connect monitor to laptop two screens

How To Connect A Monitor To A Laptop And Use Both Screens?

February 10, 2021
how to connect two monitors to my laptop

How Do I Connect 2 Monitors To My Lenovo Laptop?

January 22, 2021
Gb Whatsapp An Unexpected Error

Gb Whatsapp An Unexpected Error

November 7, 2021
Windows Flaw

If Older Battleye software is used, Windows 10 1903 Blocked

0
Mac Os

New unpatched macOS bypass gatekeeper published online

0
Siemens Medical Products

Wormable Windows Flaw Affected Siemens Medical Products

0
Cloud Computing

5 Tips of the Personal Data Protection in the Cloud

0
Tips for Buying the Perfect Travel Sim Card

Tips for Buying the Perfect Travel Sim Card

August 5, 2022
How to Write Farewell and Appreciate Messages

How to Write Farewell and Appreciate Messages?

August 5, 2022
Cyber Security Degree In Pennsylvania

Ways Block Chain Affect Web Security in 2022

August 5, 2022

10 Tips on How to Improve your Software Development Skills

July 19, 2022

Quick Links

Learnopedia
Tech Write For US
Technology Write For US
Casino Write For Us
Mr.Perfect Reviews
Cyber Security Career

Recent News

Tips for Buying the Perfect Travel Sim Card

Tips for Buying the Perfect Travel Sim Card

August 5, 2022
How to Write Farewell and Appreciate Messages

How to Write Farewell and Appreciate Messages?

August 5, 2022
Cyber Security Degree In Pennsylvania

Ways Block Chain Affect Web Security in 2022

August 5, 2022

10 Tips on How to Improve your Software Development Skills

July 19, 2022
W-SE (Web – SEcurity)

W-SE regularly updates cyber attacks, hacking and events that provide IT security professionals with information throughout the world. Also offering news in W-SE. We spent two years living and sharing guidance and insights with IT experts, detailed analyzes and news.

We also train people with product reviews in different form of content.

Browse by Category

  • computer
  • Fraud & Identity
  • gaming
  • How To?
  • laptop
  • Malware
  • Microsoft
  • Mobile
  • photography
  • Privacy
  • Reviews
  • Security
  • Security Degree
  • Smart phone
  • smart tv
  • Social
  • software
  • Tech
  • Tech today
  • Top list
  • Uncategorized
  • Virus & Threats
  • Vulnerabilities
  • Website
  • What is?

Recent News

Tips for Buying the Perfect Travel Sim Card

Tips for Buying the Perfect Travel Sim Card

August 5, 2022
How to Write Farewell and Appreciate Messages

How to Write Farewell and Appreciate Messages?

August 5, 2022
  • About us
  • Contact
  • Disclaimer
  • Home
  • Privacy Policy
  • Resources
  • Support Forum
  • Tech Blog
  • Technology Write For Us
  • W-SE (Web Security)

© 2020 w-se.com - Powered by Fix Hacked Website, Cyber Special , SSL Authority Reviews Powered by Mr.Perfect Reviews.

No Result
View All Result
  • Tech today
  • Security
    • Malware
    • Top list
  • Vulnerabilities
  • How To?
  • About us
  • Disclaimer
  • Privacy Policy
  • Contact

© 2020 w-se.com - Powered by Fix Hacked Website, Cyber Special , SSL Authority Reviews Powered by Mr.Perfect Reviews.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In