Human Error Remains the Main Challenge for Cyber-Security Worldwide
By MYBRANDBOOK
GISEC has witnessed the world’s leading cyber security experts gathered at Dubai World Trade Centre for three days starting from 1-3 April was a co-located event to IoTX and Future Blockchain Summit has witness more than 200 talks, briefing sessions and live hacking demos that were given by the world’s foremost cyber security experts and business leaders, one reoccurring theme stood out: human error remains one of the largest obstacles to cyber security.
As GISEC – the largest cyber security event in the Middle East, Africa and South Asia – draws to a close, leading experts have warned that human error continues to play a significant role in cyber security and online crime, requiring a strategic approach to educate users and employees to prevent companies and individuals from falling victim to cyber-crime.
Jamie Woodruff live hacks a nuclear power-plant, credit cards and car keys
Jamie Woodruff, the Ethical Hacker who famously hacked Kim Kardashian, Google, Microsoft, Facebook and Twitter – and who headlined GISEC’s first-ever Dark Stage – not only shone a light on the many hidden ways businesses may be susceptible to hackers, but re-emphasised how humans are so often at the heart of both on and offline crime.
“People are much more susceptible through social engineering to attacks than they are in person”, he said. “Vulnerabilities of businesses exist a lot of the time through their employees, and social engineering allows us to observe and learn their patterns, allowing entry into the company” – a technique that can have dire consequences for the company, he maintains.
Providing an apt example, one of Woodruffs anecdotes included one of his ethical hacking projects in which he gained access to the server rooms of a London-based banking institution. To do so, the expert hacker had to intercept phone conversations and CCTV cameras. Observing the bank and its employees for a whole month, he gained entry by dressing up as a pizza delivery driver. With unrestricted access to the IT infrastructure, said Woodruff, the consequences for the bank and its customers could have been disastrous.
At the climax to his seminar, Woodruff left his audience in disbelieve as he live-hacked the CCTV camera of a nuclear plant. He also obtained the two-year payment history of ten volunteers that took to the stage with their contactless credit cards – data he compromised within seconds – and showed how children toys, car keys and smart watches are all open to attack.
Experts agree that the human factor remains a key obstacle for cyber security
Re-emphasising Woodruff’s point on human error, Ankush Johar, Investor at HumanFirewall and a cyber-security authority, used his appearance at GISEC to highlight how many types of attacks occur in the world. He said: “There are over 20,000 types of attacks. Given those large numbers, training employees to successfully identify those remains a huge challenge and leaves us prone to human error. One of the keys is to alter the psychology of employees and make them suspicious by nature.”
Earlier in the week, US-hacker Kevin Mitnick – who landed himself on the FBI’s Most Wanted list after hacking more than 40 major corporations and now is a trusted security consultant to Fortune 500 companies and governments worldwide – warned on the same topic that “when teaching staff about security, companies need something relevant, entertaining and informative – not a boring book that they won’t read.”
He added: “You need to educate, train and inoculate your users. The hacker is always going to go after the weakest link, and social engineering is the easiest way in and easiest attack your enemies will use today.”
Emile Abou Saleh, Regional Director, Middle East & Africa at Proofpoint – who showcased their people-centric solutions at GISEC - said, “As cyber-criminals take advantage of the human factor to execute their campaigns, companies need to ensure they deploy effective security awareness training to educate employees for best-practices, as well as establish a people-centric strategy to defend against threat actors’ unwavering focus on compromising end-users.”
BHIM to join e-commerce, competing with PhonePe and Google Pay
The government-supported payment software BHIM is getting ready to join t...
The latest version of X helps prevent deepfakes on social medi
To combat deepfakes and shallowfakes, Elon Musk revealed a new update t...
India and Namibia collaborate on a payment system similar to U
Once operational, the platform will enable digital transactions in Namibia,...
Sebi issues show-cause notices to six Adani group firms
Sebi issued show-cause notices to six Adani Group firms, including Adani ...
TATA CONSULTANCY SERVICES
VERSA NETWORKS INDIA PVT. LTD.
BHARAT ELECTRONICS LTD.
TALLY SOLUTIONS PVT. LTD.
Technology Icons Of India 2023: Gautam Adani
Gautam Adani is the Founder and the Chairman of the Adani Group, an In...
Technology Icons Of India 2023: Natarajan Chandrasekaran
Natarajan Chandrasekaran is the Chairman of the Board of Tata Sons, th...
Technology Icons Of India 2023: Som Satsangi
With more than three decades in the IT Sector, Som is responsible for ...
GSTN aims to integrate indirect tax ecosystem on a shared IT infrastructure
Goods and Services Tax Network (GSTN) has built Indirect Taxation plat...
BEL leveraging next generation technologies to keep the country ahead in Defence space
Bharat Electronics Limited (BEL) is a Navratna PSU under the Ministry ...
CERT-IN protecting the cyber security space of India
CERT-In serves in the area of cyber security threats like hacking and ...
ADITYA INFOTECH LTD.
Aditya Infotech Ltd. (AIL) – the technology arm of Aditya Group, is ...
IRIS GLOBAL SERVICES PVT. LTD.
Iris Global services is one of the leading distribution houses that d...
FORTUNE MARKETING PVT. LTD.
Delhi based Fortune Marketing, An ISO 9001:2008 company, distributes ...