{"id":764,"date":"2023-09-19T22:51:49","date_gmt":"2023-09-19T22:51:49","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/09\/19\/what-is-a-whole-of-society-approach-to-cybersecurity\/"},"modified":"2023-09-19T22:51:49","modified_gmt":"2023-09-19T22:51:49","slug":"what-is-a-whole-of-society-approach-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/09\/19\/what-is-a-whole-of-society-approach-to-cybersecurity\/","title":{"rendered":"What Is A Whole-Of-Society Approach To Cybersecurity?"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img decoding=\"async\" fetchpriority=\"high\" class=\"size-full wp-image-373514 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/19125221\/Whole-of-Society-Approach-to-Cybersecurity.jpg\" alt=\"Whole-of-Society Approach to Cybersecurity\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/19125221\/Whole-of-Society-Approach-to-Cybersecurity.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/19125221\/Whole-of-Society-Approach-to-Cybersecurity-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/19125221\/Whole-of-Society-Approach-to-Cybersecurity-100x100.jpg 100w\" sizes=\"(max-width: 250px) 100vw, 250px\"\/>When talking about society\u2019s biggest risks, several things come to mind. A new world war, a nuclear catastrophe, or a pandemic. These risks are justified, but most forget one massive threat \u2013 cyberattacks.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Hackers are constantly under attack by individuals, businesses, and governments trying to steal information and money or simply do harm.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The bad thing about cyberattacks is that they\u2019re working. Close to 37 billion dollars go directly into cybercriminals\u2019 pockets, and the burden falls on the taxpayers.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">If your company gets hit with a ransomware attack, there are two options. You can pay the price and get the information back. Or, you don\u2019t pay, and they ruin your business and reputation and sell that data on the dark web.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">However, hackers often leave a back door to come again and steal your money when you recover from the losses. Businesses are stuck, and the costs of a data breach are increasing yearly.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">What\u2019s the solution?<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The solution is a whole-of-society approach. Bringing together everyone from individuals, organizations, companies, and governments to fight cybercrime. It might seem like a utopia for society to agree on one thing altogether, but it\u2019s already working in the United Kingdom.<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">In 2022, more than 7 million websites and emails were reported as suspicious. That comes out to 20,000 a day. It\u2019s amazing what people can do when they work together.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The NCSC removed a quarter-million malicious links to protect their citizens and businesses from cyberattacks.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">That should be the case in every country. Massive corporations have the finances to employ large cybersecurity teams, establish protocols, and build impenetrable cyber fortresses. But what about the small businesses?<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Small businesses are the lifeblood of every economy and national prosperity. In the UK, they constitute 99 percent of the ecosystem. They don\u2019t have resources and experts at their disposal to guard against cybercrime. But they have cooperation and help from the government.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The NCSC gave them access to check emails securely and perform vulnerability scans. When these services are available for free, people use them.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Are there any challenges to a whole-of-society approach to cybersecurity?<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">We can all agree that hackers are bad, and companies and organizations need cybersecurity help. That\u2019s great. But where do we go from there? The answer lies in a complicated web of state and local organizations, institutions, and systems.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The benefits of a whole-of-society approach to cybersecurity are outstanding. The UK example shows that it\u2019s a net positive for a country. But it takes a lot of work.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">State offices struggle with IT risk. How can you evaluate their cyber hygiene when modern threats are constantly lurking?<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Plus, loads of local institutions are intertwined with state systems. All it takes is for a hacker to breach the weakest link, and the entire system falls like a stack of dominoes.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A whole-of-society approach needs to start at the local level. Of course, the first thing is training. You can\u2019t fight against a threat if you don\u2019t know what you\u2019re up against. Then, there comes the distribution of tools. Whether it\u2019s email security checkers, malicious link scanners, antivirus programs, or VPNs, the government can distribute funding to every participant, and they can use it to fight against hackers.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Creating a uniform solution will take years. But it\u2019s better than nothing. The information age is upon us, and individuals, companies, organizations, and governments must adapt. Every generation has its challenges, and cybersecurity is ours to bear.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">How to implement cybersecurity best practices?<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">At the end of the day, everything boils down to the individual. You and the people around you need to know the best cybersecurity practices and practice them continuously. Expand them to your business; everyone will be on the road for a whole-of-society approach.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">To ensure a good start in your family, business, or organization, you must make cybersecurity easy and fun. No one likes boring presentations, so you need to make the coaching relatable.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Instead of discussing the business, change the approach and go down to the personal level. Our personal devices are the gateway to everything. We all have phones, laptops, and computers. Show how a video of a hacker gaining control of a phone and watch faces get glued to the presentation. When they see how easy it is to fall for a scam or get hacked on public Wi-Fi, teammates will want to know more.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">After you grab their attention:<\/p>\n<ol style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">\n<li>Encourage them to secure their devices and care for them better.<\/li>\n<li>Make VPNs and antivirus programs mandatory, and train for human error.<\/li>\n<li>If you have corporate devices, install remote management tools to restrict downloads and scan the web.<\/li>\n<\/ol>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Next comes training for phishing attacks. That\u2019s a journey that never ends because scammers change their approaches. Everything started with the Nigerian Prince scam, where people would get a message from a supposed \u201cprince\u201d and be promised gold in exchange for money for transporting it. Hackers create phishing emails that look identical to legitimate companies urging you to click on links. They pretend to be someone else on dating apps to steal money or catfish other users. Scammers even create fake job posts to infiltrate specific companies by targeting their employees.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Regarding training, you should pay the most attention to remote workers. They should adhere to a specific security policy because public and home networks have unique risks.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Final words<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Cybercrime is currently the largest threat to individuals, companies, and governments. It\u2019s much more likely that you\u2019ll get hacked than mugged. For example, installing a single unprotected IoT device in your house can invite more than 12000 hacking attempts.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">For that reason, a whole-of-society approach is crucial when it comes to cybersecurity. Knowledge and resources need to be readily available from the individual to the corporate and federal levels. With that, there\u2019s a chance to fight off hackers for good.<\/p>\n<p>\u00a0<\/p>\n<div style=\"background-color: #d4f1f4; padding: 15px 15px 10px 15px;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong>Disclaimer:<\/strong> The author is completely responsible for the content of this article. The opinions expressed are their own and do not represent IEEE\u2019s position nor that of the Computer Society nor its Leadership.<\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/whole-of-society-approach-to-cybersecurity\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] When talking about society\u2019s biggest risks, several things come to mind. A new world war, a nuclear catastrophe, or&hellip;<\/p>\n","protected":false},"author":1,"featured_media":765,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[573,8,676,2,677],"tags":[],"class_list":["post-764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","category-cybersecurity","category-phishing","category-tech-news-post","category-whole-of-society"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=764"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/765"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}