How SMEs can stop cyber attacks on their businesses

By: Alain Tshal, district sales manager – sub-Saharan Africa F5 Network

SMEs can easily fall victim to cybercrime.

Focused on getting their businesses off the ground, they are oblivious to the vast amounts of data they’re accumulating.

· 43 percent of cyberattacks target SMEs1

· Cyber breaches on SMEs increased by 424 percent in 2019.

· Cyber-crime costs SMEs over $2.2 million a year.

· 60 percent of SMEs that encounter a cyber attack go out of business within six months.

The writing is on the wall: SMEs are prime targets for hackers. It is imperative that SMEs have robust measures in place to deter cybercriminals. Let’s explore the top recommended security controls for 2020 in order of urgency:

1) Use strong authentication to limit unauthorised access

Strong authentication is essential as access control attacks are prevalent and often the tip of the spear for most cyber-mayhem. Multifactor authentication (MFA) is recommended,

especially for any system that connects to high-value services and data stores. When MFA isn’t feasible, strengthen the use of passwords. Key tips include regularly checking passwords against a dictionary of easy-to-hack credentials, using long passwords and eliminating password hint mechanisms. All authentication systems should have a mechanism to detect and throttle floods of login attempts.

2) Practice regular monitoring and logging

Monitoring and logging are all about knowing what is going on in your environment. With a good logging and review regimen, it’s possible to catch breach attempts in progress before real damage can occur. When reviewing logging capabilities, remember the goal is to be able to determine how an attacker got in and what they did.

3) Take inventory

Knowing what you have, where it is, what it talks to and how it is configured is the foundation for all risk decisions, both strategic and tactical. While there are plenty of automation tools available, it is important to ensure they are a precise fit with your specific business requirements.

4) Strategise and practice incident response

No affordable defence is going to keep all attackers at bay forever. Plan accordingly with a well-tested and detailed incident response plan. Incident response relies on strong inventory and logging practices, so make sure those are well-honed. Each major threat should have response scenarios that include trigger definitions (when an incident occurs), activation plans (who and what jumps into action and when), intelligence collection (what logs and devices should be examined), containment (specific playbooks to activate additional controls), investigation (who analyses what and when), reporting (for legal and executive conversations), and recovery (of both data and system rebuilds).

5) Apply crucial patches

It’s unreasonable to assume that the average enterprise is going to patch everything without shutting down all useful work. The highest priority is closing vulnerabilities with published, weaponised patches. Even unskilled attackers will pound your systems with these types of point-and-click attacks. Browsers and mail clients should also be kept up to date to safeguard against malware.

6) Enforce strict authorisation

Authorisation means forensically interrogating permissions associated with any credential set. Once someone is logged in, what can they do? This is where the ‘principle of least privilege’ should be used so that users can only perform tasks specific to them. A good middle ground is to implement role-based access and broadly lock down authorised actions based on general job duties such as administrator, developer, office staff and remote user. System administrators are frequently targeted by attackers due to their unrestrained access to resources Administrative usage should be partitioned to just the systems a given

Hacker Image by Gerd Altmann from Pixabay
60 percent of SMEs that encounter a cyber attack go out of business within six months

administrator is responsible for managing. The same goes for service accounts that run in the background.

7) Scan for vulnerabilities

Vulnerability scanning is useful for gaining a ‘hacker’s eye view’ of your systems and is also a great way to double-check your inventory. Weekly vulnerability scans are advisable for both internal and external assets.

8) Detect and block malicious bot activity

It’s getting harder to identify humans. Many bots are evident from previously observed, unique patterns that have been encoded into signatures. However, newer and more sophisticated bots require deeper analysis such as looking for irregular behaviour and illogical client configurations.

9) Conduct security awareness training

F5 Labs analysis2 notes that training employees to recognize phishing attempts can reduce their click-through rate on malicious emails, links and attachments from 33 percent to 13 percent. The key to effective training is to consider what decisions you want your users to make and what you can reasonably expect from them.

10) Use web application firewalls (WAF)

Web Application Firewalls (WAF) are essential for application protection. The technology offers a level of application-layer visibility and control that can help mitigate a wide range threats. Many WAFs also include the capability to inspect, validate and throttle API requests (the transfer of resources between connected applications).

11) Use SSL/TLS inspection

More and more malware and phishing sites are being buried within encrypted SSL/TLS sessions, often using legitimate certificates. This traffic needs to be decrypted, inspected, and sanitised.

12) Use antivirus solutions

Antivirus remains a powerful tool for detecting and stopping malware infections. It should always be configured to update its signatures without intervention and alert when it stops functioning.

13) Love your apps

Get to know and love your apps, wherever they are. Always make sure your controls are fit for purpose and running smoothly.



Latest


24 Nov 2020
Study finds that industrial manufacturing is ripe for a digital manufacturing transformation

Surveying thousands of manufacturing executives across the globe, HP’s Digital Manufacturing Trend Report finds that companies are increasingly investing in…

Study finds that industrial manufacturing is ripe for a digital manufacturing transformation

Surveying thousands of manufacturing executives across the globe, HP’s Digital Manufacturing Trend Report finds that companies are increasingly investing in advanced 3D printing solutions that provide the agility, speed, and flexibility necessary to grow their business and become more resilient in an ever-changing environment. As a leader driving this digital…

23 Nov 2020
Bureau Veritas and TWAA launch female-driven digital mentorship programme

Testing, inspection and certification leader, Bureau Veritas has partnered with TWAA to launch its ‘BV Women in Africa Mentorship’ programme.…

Bureau Veritas and TWAA launch female-driven digital mentorship programme

Testing, inspection and certification leader, Bureau Veritas has partnered with TWAA to launch its ‘BV Women in Africa Mentorship’ programme. TWAA is an innovative and disruptive global and professional networking, knowledge sharing and mentorship platform for women and girls. The platform provides women with digital tools to connect and find…

23 Nov 2020
Transformative tech trends you need to know by 2021

ABI Research’s latest whitepaper highlights 36 transformative technology stats in manufacturing you need to know for 2021. As manufacturers integrate…

Transformative tech trends you need to know by 2021

ABI Research’s latest whitepaper highlights 36 transformative technology stats in manufacturing you need to know for 2021. As manufacturers integrate IT and OT, they rely on Industrial IoT (IIoT) platforms dedicated to smart manufacturing to manage their devices, connectivity, infrastructure, and data. These IIoT platforms also help manufacturers implement applications,…

19 Nov 2020
How COVID-19 is fast-tracking adoption of renewable energy in Africa

Spurred on by the COVID-19 global pandemic, the world is finally galvanising its commitment to move towards a green and…

How COVID-19 is fast-tracking adoption of renewable energy in Africa

Spurred on by the COVID-19 global pandemic, the world is finally galvanising its commitment to move towards a green and sustainable future and the global energy transition is the cornerstone of this new world. This transition to renewable energy will continue to rapidly gain momentum throughout the coming decade, led…


Top stories


29 May 2020
Electra Mining Africa 2020 cancelled due to pandemic

Electra Mining Africa 2020, due to take place from 7 to 11 September at the Expo Centre in Johannesburg, has…

Electra Mining Africa 2020 cancelled due to pandemic

Electra Mining Africa 2020, due to take place from 7 to 11 September at the Expo Centre in Johannesburg, has been cancelled due to the COVID-19 pandemic. The next edition of the show will be held from 5 to 9 September 2022 at the same venue. Continued prohibition of large…

01 May 2020
JF Equipment launches innovative mobile unit for sanitisation in public places

In the midst of the COVID-19 pandemic JF Equipment has launched the revolutionary and durable Sani-Tunn, a mobile unit that…

JF Equipment launches innovative mobile unit for sanitisation in public places

In the midst of the COVID-19 pandemic JF Equipment has launched the revolutionary and durable Sani-Tunn, a mobile unit that can sanitise an individual as well as whatever they may be carrying. As the world adjusts to the new social norm, it’s encouraging to see how innovative our resilient nation…

08 Apr 2020
Uncovering the face of cyber crime: How a hacker scammed over $100 000

Researchers from cyber crime solutions company, Check Point, have painstakingly uncovered the identity of a prolific cyber criminal known as…

Uncovering the face of cyber crime: How a hacker scammed over $100 000

Researchers from cyber crime solutions company, Check Point, have painstakingly uncovered the identity of a prolific cyber criminal known as ‘Dton’. When you spot a phishing attempt or an email with a suspicious document attached in your inbox, have you ever wondered who actually sent it to you, and how…

18 Mar 2020
Coronavirus-triggered recession will change how we do business but could speed up Industry 4.0

The recovery from a coronavirus-triggered recession will usher in a new era in which the way we live, do business…

Coronavirus-triggered recession will change how we do business but could speed up Industry 4.0

The recovery from a coronavirus-triggered recession will usher in a new era in which the way we live, do business and invest will fundamentally change. This according to Nigel Green CEO and founder of the deVere Group, one of the world’s largest independent financial advisory organisations. These comments come as…


Visit the official COVID-19 government website to stay informed: sacoronavirus.co.za