Key 2019 Hikvision Cyber Blogs Offer Tips to Prevent a Vulnerability, Deter Password Hacks and Backdoor Exploits
The Security magazine article, “Cyber Leads Global Business Risks for First Time: Allianz Risk Barometer 2020,” outlined results of the latest Allianz report, which found for the first time that cyber risks such as vulnerabilities, password hacks, backdoor exploits and other threats ranked as the top security concern for global businesses.
The report gathered responses from more than 2,700 risk management professionals in more than 100 countries, and found 39 percent selected cyber incidents as the top business vulnerability.
From the report: “Seven years ago cyber risk ranked only 15th with just 6 percent of responses. Awareness of the cyber threat has grown rapidly in recent years, driven by companies’ increasing reliance on their data and IT systems and a number of high-profile incidents. Businesses face a growing number of cyber challenges including larger and more expensive data [security] breaches, an increase in ransomware and business email compromise (spoofing) incidents, as well as the prospect of litigation after an event.”
Cyber took the top position in the United States at 43 percent, followed by business interruption (BI), according to the research.
Key 2019 Hikvision Cyber Blogs Offer Tips to Prevent a Vulnerability, Deter Password Hacks and Backdoor Exploits
Hikvision summarized key cyber threats and ways to protect yourself online in this blog. The following are some of the cybersecurity tips included in that article to avoid password hacks, backdoor exploits and vulnerabilities:
- Juice-Jacking: Read this Hikvision blog to learn more about juice-jacking as a cyber-threat and security concern, and learn more about this threat. You can avoid juice-jacking while in malls or airports by not using public USB charging stations. Juice-jacking happens when someone connects their mobile device to a USB charging station that charges the device, but has also been modified to copy data from the mobile device, like photos and text messages, or infect the device with malware.
- Phishing: In this Hikvision blog, our cybersecurity director outlines examples of common phishing practices so you can learn to identify them. Phishing attacks have long been an effective way for attackers to trick people into divulging sensitive information or infecting a system with malware. Malware can give an attacker remote access to protected systems and networks, encrypt a user’s data and charge a ransom to decrypt the data, or use that system as part of an attack against other systems.
- Spear Phishing: Hikvision addresses a special kind of phishing attack that targets a specific person or organization, called spear phishing, in this article. Spear phishing emails typically have information about the victim in the email that makes the email seem credible.
- Protect Yourself Online: Preventing password hacks means using complex passwords and not reusing passwords across multiple sites or logins to help you stay safe online. The most important aspect of a passphrase is that it should be long—at least 12 characters. Read this Hikvision blog that outlines insights to stay safe with good passwords, web browser security and firewall security.
Visit this Hikvision page for more cyber tips. To learn more about Hikvision security cameras, DVRs, NVRS and other business solutions, click here.