{"id":248,"date":"2016-08-09T15:47:49","date_gmt":"2016-08-09T20:47:49","guid":{"rendered":"https:\/\/www.onlc.com\/blog\/?p=248"},"modified":"2016-08-09T15:47:49","modified_gmt":"2016-08-09T20:47:49","slug":"reduce-social-engineering-attacks-cybersecurity-certification","status":"publish","type":"post","link":"https:\/\/www.onlc.com\/blog\/reduce-social-engineering-attacks-cybersecurity-certification\/","title":{"rendered":"Reduce Social Engineering Attacks: Cybersecurity Certification"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The list of high-profile companies attacked by cyber criminals is long and includes big names like Target, Sony, Citibank, Anthem, and Home Depot to name a few. Could these social engineering attacks have been prevented? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">As part of <\/span><a href=\"http:\/\/www.reuters.com\/article\/us-home-depot-breach-settlement-idUSKCN0WA24Z\" target=\"_blank\"><span style=\"font-weight: 400;\">Home Depot\u2019s recent settlement<\/span><\/a><span style=\"font-weight: 400;\">, it agreed to pay at least $19.5 million to compensate U.S. consumers harmed by a 2014 data breach that affected more than 50 million cardholders, improve data security over a two-year period, and hire a chief information security officer to oversee its progress. The company said the intruder used a vendor\u2019s login information to infiltrate its computer network and install malware to steal sensitive information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Multi-million dollar losses are common these days. According to a <\/span><a href=\"http:\/\/www8.hp.com\/us\/en\/software-solutions\/ponemon-cyber-security-report\/index.html?jumpid=va_fwvpqe387s\" target=\"_blank\"><span style=\"font-weight: 400;\">2015 study by the Ponemon Institute<\/span><\/a><span style=\"font-weight: 400;\">, cyber crimes cost the average U.S. company participating in the study approximately $15.4 million per year, with 62 percent experiencing recurrent phishing and other social engineering attacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Can Attacks be Prevented?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Having cyber security experts train employees can be extremely effective in keeping criminals out of a company\u2019s ecosystem. For example, social engineering is a form of cybercrime that targets humans, not computers. Imagine a con man tricking you into handing over the keys to your home or office. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Social engineering uses the same type of manipulation &#8211; with hackers phishing for employees or vendors willing to relinquish their online passwords and login information. We\u2019ve all gotten emails that appear to be from friends or colleagues, telling us to \u201cCheck This Out!\u201d so we\u2019ll open a video file with malware. Or messages that appear to be from IT departments, banks, or credit card companies asking us to \u201cclick here\u201d to verify information. Once the malware enters a company\u2019s ecosystem, cybercriminals have access to any information that they could want.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What\u2019s at Stake?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cybercrime is big business, and organized crime syndicates and state-affiliated actors are often the perpetrators. New social engineering schemes are created every day to keep the money flowing. And money isn\u2019t the only thing victimized companies have to deal with:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Stolen Information<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Cybercriminals steal passwords, financial data, credentials, customer records, employee data, contact lists, and so on.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Damaged Reputation<\/b> <span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Not just high-profile companies take a hit when data theft occurs.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Lost customers<\/b> <span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">E-commerce sites and mobile apps can be shut down for days or weeks during an attack, and some customers never return.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Lower productivity<\/b> <span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Employees dealing with the data breach won\u2019t have time to do their regular work.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Are Companies Keeping Up with Threats?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While some companies employ cyber security professionals or outsource cyber security to experts, most companies still have a long way to go. According to a <\/span><a href=\"http:\/\/www.ponemon.org\/blog\/new-ponemon-study-on-malware-detection-prevention-released\" target=\"_blank\"><span style=\"font-weight: 400;\">2016 Ponemon Institute study<\/span><\/a><span style=\"font-weight: 400;\">, many IT departments struggle to prevent and detect malware and advanced threats. Only 39 percent of survey respondents rated their ability to detect a cyber attack as highly effective, and similarly, only 30 percent rated their ability to prevent cyber attacks as highly effective.<\/span> <span style=\"font-weight: 400;\">With over 60 percent saying they struggle to detect and prevent cyber attacks, job prospects are excellent for cyber security professionals.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The Importance of Cyber Security Certification<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It is far less expensive for companies to be proactive by hiring and providing ongoing training for cyber security professionals than it is to clean up the mess after a data breach. For example, cyber security experts can identify potential weaknesses and make sure browsers, software, operating systems, firewalls, email filters and anti-virus software are updated. They can also teach employees about new threats being unleashed daily including new phishing scams that make it through email filters or anti-virus software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ONLC offers classes that lead to\u00a0<\/span><a href=\"https:\/\/www.onlc.com\/blog\/cyber-security-certification-right\/\" target=\"_blank\"><span style=\"font-weight: 400;\">cyber security certifications<\/span><\/a><span style=\"font-weight: 400;\"> for CompTIA Security+ and CASP, Microsoft MTA Security, Certified Ethical Hacker (CEH), CISSP and CyberSec security. Contact us today to find the best certification for your situation.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The list of high-profile companies attacked by cyber criminals is long and includes big names like Target, Sony, Citibank, Anthem, and Home Depot to name a few. Could these social engineering attacks have been prevented? As part of Home Depot\u2019s recent settlement, it agreed to pay at least $19.5 million to compensate U.S. consumers harmed [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-certifications"],"aioseo_notices":[],"modified_by":"blogadmin","_links":{"self":[{"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/posts\/248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":3,"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/posts\/248\/revisions"}],"predecessor-version":[{"id":252,"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/posts\/248\/revisions\/252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/media\/249"}],"wp:attachment":[{"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/media?parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/categories?post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onlc.com\/blog\/wp-json\/wp\/v2\/tags?post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}