7 minute read

Elias Chabtini

Advertisement

Haseeb Awan

The days are long gone where the security threat surrounded our computer only. Modern problems have expanded to our personal devices. The broad classification of these threats would fall into four categories: 1. Application-based threats; 2. Web-based threats; 3. Physical threats; 4. Network-based threats

Application-based threats: Privacy, information security, and data security are inseparable, dependent on each other, as well as, complimentary.

Web-application threats occur when the application resembles an authentic application, but it is a disguise and has the ability to skim your precious information.

The prime examples include malware and spyware where your personal information is at stake.

Web-based threats: As subtle in nature, these web-based threats remain unnoticed because visitors visit malicious websites that are better from their front-end but in reality, they are skimming your information by downloading malicious content on your device. Physical threats: This occurs when you lose your mobile phone or if it has been stolen. This is a strong case for hackers to loop into your personal information via your device (as they have direct access to the hardware where all your personal information is resting).

Network-based threats: This is where cybercriminals are actively looking to encrypt your data with the use of public Wi-Fi networks.

The advanced mobile threats comprises of: a. Phishing attacks; b. Data leakage; c. Unsecure Wi-Fi (particularly public Wi-Fi) connection; d. Sim Swap

Phishing attacks: A phishing attack is an online theft attack that gains your personal information such as username, password, and even your financial information. Phishing education is mandatory to mitigate the risk of this threat to an acceptable level. It is incumbent to learn that phishing is different from conventional scams. The thwarting ways would differ depending on the level of fraud committed and who is the victim (corporation or individuals).

Tech Insight

Haseeb Awan

For corporations it would be: 1. Design policies in place and the communication should be strong, 2. There should be a control designed to ensure the legitimacy of an email and it should be communicated to loyal customers (as well as others), 3. Scan the internet for likely phishing sites, 4. Implement a quality anti-virus, anti-spam, and content filtering at the gateway.

For individuals it is simple: 1. Block malicious or fraudulent email promptly, 2. Detect and delete malicious software immediately, 3. Block the sensitive information delivery to third parties automatically, 4. Apply skepticism wherever necessary.

Data Leakage: Data leakage occurs where there is a compromise in the (information) confidentiality breach. This refers to an unauthorized leakage or possible data transmission within an organization to a third party. The lost data is either private, sensitive, or confidential in nature. The data could be lost due to a system crash or even a deliberate deletion.

Safeguards-

1. Quarantine your outgoing information (which is private, sensitive, or either confidential in nature) from your organization network. 2. Archive suspicious files. 3. Quarantine sensitive files to be copied into USB or smartphones. 4. Block print jobs that contain private information. 5. Discover confidential information that is stored on databases, organizational laptops, and workstations.

Unsecured Public Wi-Fi: Public Wi-Fi networks offer potential privacy risks and invite security issues. People are tempted to pursue public WiFi which is controlled by a hacker. It invigorates the MITM attack.

Safeguards –

1. The network should be verified. Hackers are smart but users are smarter, it is better to play smart. 2. Using a VPN (Virtual Private Network) which is the most secure surfing option on public networks. 3. Use Antivirus and keep the Firewall Enabled. Sim Swap: A fraudster beautifully impersonates you and manages to get victims Sim deactivated. There is a replacement activation without the knowledge of the victim (Marimuthu, V., 2019).

This is a surplus for hackers where they can reset victims' online accounts. EFANI was designed to mitigate such happenings with a 100% money-back guarantee for 60days.

Ÿ Safeguards –

1. Beware of phishing - as it penetrates sim swapping incidents. These sketchy emails and bogus logins can get the hacker the required information and these key data can spawn a sim swap occurrence. 2. People should rely less on online space, they should reduce the personal information to be stored online. Social engineering is an initial sim swapping stage, where the hacker collects as much information as they want. Keep compromising information low-key such as your digits, date of birth, mailing address off your account. 3. Protect your accounts or crypto space using Yubikey, frequently changing the PIN, multi-factor authentication. Please do not trust SMS-based 2FA.

A Connected World

Networking and Business

rom speedy access to the Finternet to the ability to instantly get in touch with almost anyone anywhere in the world by dialling just a few digits, the contemporary technology-oriented world has changed the way we connect and communicate. With smart devices, people have also become smarter.

Though the processes of connecting have become simpler, there is a need for effective communication and service between users, applications, services, devices and so forth. This is where network infrastructure comes into the picture.

Let’s consider the current situation. COVID-19 has compelled IT businesses to close their workplace and made their employees work remotely. As employees working from a different location on enterprise networks consists of traffic and thus, centralizing traffic could have been a challenge for business. To address this challenge, there arises a need for a suitable network infrastructure.

Along with the employee's performance and excellent equipment, the agility and productivity of organizations also depend on the robust and secured network infrastructure. In today’s digital age, businesses cannot afford to have poor user experience and security issues that can impact employee productivity and thus, are realizing the importance of adopting comprehensive network infrastructure. With sound networking solutions, businesses can ensure optimum efficiency and excellence in their operations.

Even though enterprises have understood the importance of network infrastructure, choosing the right networking services partner is another challenge. Businesses are in search of partners with integrated networking solutions and a team that possesses the required skill-set and industry rich expertise. They are on the lookout for a solution provider which they can trust and rely on.

Taking this need into consideration, many networking solution providers have come forward with cutting edge solutions and are ensuring the smooth running of the enterprises without any performance issue. The changes start with migration to 5G technology. It is built to increase the network speed and reduce latency. It will assist in the mobilization of employees allowing them to work from any part of the world.

Next up is harnessing the prowess of Artificial Intelligence(AI) and Machine Learning(ML) in solving business problems in real-time. Right from hiring the most suitable candidate to process transformation and enriching customer experience, AI and ML can deliver solutions to help business flourish.

Cloud Solutions are seen as the way forward to maintain business continuity and resilience and are being proven effective in today’s crisis. It has helped teams stay connected over work and seamlessly deliver services proving that physical distances can’t dampen the innovative spirits. Digital experiences supported by Cloud have found new takers during the pandemic and the technology is poised for steady growth.

With so much dependence on networks, it is bound to grow complex. To reduce and manage its complexity and shift creation of network rules and its maintenance, Intent-based networking is one solution to look-out for. The idea is to put a network controller(deploying AI/ML) that can regularly monitor the network, suggest best paths and continuously adjust the network performance for maximum output.

And while we are at it, how can we not mention Internet of Things(IoT). From empowering manufacturing, providing enhanced tracking to logistics, to helping the healthcare sector in remote monitoring and more, IoT is redefining the way industries work and behave. As connectivity grows, so does IoT’s application.

Networking is evolving and with each new step that it takes, it presents a new opportunity for businesses to digitally transform and scale their services.