[ad_1]
A recent study by F5 Network, a leading application protection company, found that more than one-third of the 34.29% surveyed said the theft of Internet payment cards (70%) and hacking are violations of major applications that pursue businesses at a sophisticated speed. (26%), hacking application databases (4%), and scans also indicate that it's scary that 13%% of all Internet application violations was related to the possibility of # 39, unauthorized or permitted access.
It also indicates that the rate of theft of identification information via a hacked email was (34.29%) and that the percentage of the access control setup was incorrect (22, 86%), (8.57%) of these flights were based on filling in identification information from stolen passwords, (5.71%) through attacks aimed at breaking passwords, theft of social engineering (2.76%).
This evidence also shows that digital applications and identities are the primary targets for 86% of violations. Companies around the world are therefore facing a growing sense of panic and disorder, becoming more vulnerable than ever before. Passed through terrorist attacks, such as malware that enters browsers to manipulate application validation credentials, and then malware strings that target financial connections to threaten customers with browsers and malware. Mobile devices.
Although there is no way around it, the security of your emails will protect you, otherwise your life will be controlled by the application of the General Data Protection Directive (GDPR). l & # 39; EU. This horror film is absolutely unavoidable if you have been hacked or if you have not managed to enforce the compliance rules.
Institutions must take the necessary precautions to protect critical biological assets. F5 networks can paint a gloomy picture of the situation, but the same time provides many useful preventive measures.
Topics related to what you are reading now:
Here is a list of steps that can improve the security situation and protect employee applications and sensitive data:
- Understand the nature of the endangered environment and set defensive priorities to address serious concerns Identify important applications and reduce the surface of your attacks Remember that the surface of the application is constantly expanding to multiple layers and using more third-party data sharing APIs.
- Use the data to drive your own risk strategy and identify what attackers could target specifically and warn that hackers could detect and exploit the emergence of part of the application service on Internet.
- Properly configure your network systems, otherwise you risk losing applications to your internal information and infrastructure information, including server names, private network addresses, email addresses, and even user names. These are all valuable ammo for the attacker to carry out the attack.
- Beware of common threats such as denial of service attacks, malware, phishing, and other malicious attacks, and ensure that computer response strategies are developed for you. adapt to new vulnerabilities and attacks and thus improve survival rates.
- Implement a robust set of easy-to-manage security solutions, such as Advanced Application Protection Walls (AWAF). Staff.
- Be sure to apply a protective safety culture and educate employees about business strategy issues and device management, as well as the safe use of the Internet and the Internet. cloud.
- Be sure to travel on a business trip as you do not need to make any financial transactions that require a credit or debit card when using public or free Wi-Fi services, and never assume the security of mobile devices and mobile devices, even in local cafes.
- Change passwords regularly, which is very important, especially after a trip, as the devices may be compromised during transport.
- Always back up data on supported devices or secure cloud platforms to ensure that critical information is not lost, stolen or recovered quickly in the event of an attack.
- Always remember that a neglected employee who does not feel responsible for the loss of his work equipment can harm the reputation of the company.
"We must not forget that neglecting the issue of electronic security will certainly have serious consequences," said F5 Networks Systems Engineering Manager. The business world is full of victims of electronic security. So we must avoid the abominable electronic graveyard and know the vulnerabilities of applications and how to attack them. And make sure the right solutions are in place to mitigate the risks. "It's time to get rid of hungry cybercrime."
Thank you for visiting our website. If you have any questions about this news, feel free to visit us or leave a comment below.
Source: Arab Technology News
[ad_2]
Source link