Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Digital literacy is an important term to understand for those who interact with the digital environment – aka, everyone. In this blog, we discuss digital literacy at a high-level, but will get into more specifics in this ongoing digital literacy series. Stay tuned!
Digital literacy is a trendy term in the technology sector. According to Wikipedia, it is “the set of competencies required for full participation in a knowledge society. It includes knowledge, skills, and behaviors involving the effective use of digital devices…for purposes of communication, expression, collaboration and advocacy.”
More simply put, it’s the ability of an individual to engage with the digital environment. In terms of infosec, you can take it further to mean the ability to operate technologies safely – knowing what to do and what not to do and how to avoid taking unnecessary risks.
If you compare it to driving a car, we know that operating a vehicle requires a certain amount of practice and knowledge. It also requires you to pay attention to all that’s going on around you. The same is true with cybersecurity – in order to participate in a digital environment, you need to understand the rules. This is what makes you digitally literate.
Digital literacy is an unavoidable part of everyday life that people tend to overlook. Almost our entire lives are online (whether you like it or not) and that’s only going to increase. Everyday users who don’t really “care much” about cybersecurity are the easiest and quickest targets for fraud and for access into an organization they work for. Pursuing digital literacy not only benefits you, but it also protects your friends, family and workplace.
There are a number of areas where people understand less than they should about online safety. For now though, I’ll highlight 5. These areas matter for every individual, whether in personal or professional environments.
Monitor your behaviour on social networks
There is a lot of misunderstanding around what people should and should not do/post on social networks. Before putting something online, you should ask yourself: Does this need to be public? Is it worth the risk? Not only is what you share online available to friends and family, but it’s also available to cybercriminals.
These cybercriminals—or hackers—present both physical and virtual threats. The bad guys can use your social networks to gather user behaviour habits, like where you live and when you’re home. They can also access personally-identifiable information like birthdays, which can be used to facilitate fraud and identity-theft.
Additionally, it’s important to remember that the information you provide on social channels can be used by cybercriminals as a way for them to understand your social networks and consequently gain access to business targets with confidential data they can exploit.
Keep your devices safe
Anti-virus software is great, but consumers tend to be overly reliant on it. There are additional measures you should take—like how you configure the settings on your devices. Each operating system you use has security settings that are often disabled by default. A good first step would be to learn what these settings are and to use them to your advantage. Also – be sure your patching is automatically triggered on your devices and you’re always taking the time to complete software updates whenever they’re available.
At work, consider how this plays a role with bring-your-own-device (BYOD) programs. Because so many of us bring personal devices to the workplace and connect them to business networks, ensuring those devices are protected and used wisely puts significant responsibility on you as the employee.
Understand how best to use passwords
Passwords need to be complex and hard to guess, but not so much so that you can never remember them. One thing I like to recommend is “passphrases.” To make these, simply come up with a phrase you can remember and then make a password from the first letter of each word in the phrase. For example, if the phrase is “I love my red dog Pluto!”, the password would be “IlmrdP!”.
Additionally, enable 2-factor-authentication whenever possible and don’t use the same password for all your accounts. You can use a password manager to help you keep track of all your passwords. I recommend an app called “keypass” – it’s free!
Handle unsafe content
It’s important everyone knows exactly how to respond or react in unsafe situations online. Here’s a few things to watch out for:
Whatever you come across online, follow this simple rule: STOP and THINK. A few seconds of deliberation could save more than just your computer in the long-run.
Safety considerations for the future
When it comes to technology, the world is changing quicker than most people can keep up with. We’re entering an era in which more information is available than ever before, we’re increasingly reliant on technologies for even the most basic tasks, and technology is almost completely unavoidable. Although that may sound daunting, it doesn’t have to be.
We need to be prepared. Our online presence has made us overly exposed—like being naked in a digital environment. The increasing interconnectedness between business and personal environments means we have to assume individual responsibility to make sure we’re using precautions on all our devices when online. It is not an impossible task, but it will require vigilance.
Education, education, education. Employers must take the time to train their employees on the importance of safe practices online. In our recent threat intelligence report from Q2 of 2017, we found that of 4 million cyberattacks, about 40,000 of them are phishing attacks. There are millions of stories online about people who have been hacked because of phishing – read these stories and learn from these mistakes!
The advance in technology is truly an exciting time. But like all progress, it will require some adjustments. If you’re an employer, consider how these knowledge gaps could compromise your business. If you’re an employee, take the time to educate yourself about online risks.
eSentire® is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. For information about our services, please visit www.esentire.com.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.