• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

UK Security Agency Wants Fresh Approach to Combat Phishing

You are here: Home / General Cyber Security News / UK Security Agency Wants Fresh Approach to Combat Phishing
December 21, 2022

The UK National Cyber Security Centre (NCSC) has termed for a protection-in-depth solution to support mitigate the effect of phishing, combining complex controls with a solid reporting lifestyle.

Composing in the agency’s site, technical director and principal architect, “Dave C,” argued that many of the properly-founded tenets of anti-phishing assistance only really don’t operate.

For illustration, advising consumers not to simply click on links in unsolicited emails is not beneficial when quite a few need to do precisely that as part of their career.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


This is generally merged with a society in which buyers are fearful to report that they’ve accidentally clicked, which can hold off incident response, he reported.

It’s not the user’s duty to location a phish – relatively, it is their organization’s responsibility to secure them from such threats, Dave C argued.

As these types of, they should really develop layered complex defenses, consisting of email scanning and DMARC/SPF guidelines to avert phishing e-mail from arriving into inboxes. Then, corporations ought to take into account the following to avert code from executing:

  • Allow-listing for executables
  • Registry settings changes to be certain harmful scripting or file forms are opened in Notepad and not executed
  • Disabling the mounting of .iso information on consumer endpoints
  • Creating confident macro configurations are locked down
  • Enabling attack surface reduction procedures
  • Guaranteeing 3rd-party application is up to day
  • Maintaining up to day about existing threats

Also, companies ought to get actions this kind of as DNS filtering to block suspicious connections and endpoint detection and reaction (EDR) to monitor for suspicious conduct, the NCSC encouraged.

“Let’s be crystal clear that if your organization implements the measures earlier mentioned, and checks and maintains them, it’s likely there will be a sizeable drop in attackers exploiting your people to acquire preliminary entry,” said Dave C. “However, it is nonetheless truly worth training buyers to location suspicious back links.”

This is so that consumers can location attacks concentrating on their individual accounts as a pathway into corporate systems, and that they flag suspicious emails in purchase to make improvements to intelligence accumulating, he added.

Companies need to also shift away from the blame society bordering phishing reporting, the NCSC urged.

“Imagine a scenario wherever a user isn’t embarrassed to report when they’ve clicked on a malicious link, so they do so promptly, the security workforce many thanks them for their swift action and then performs promptly to realize the ensuing publicity,” Dave C concluded.

“This is a considerably more constructive sequence of occasions, and with the added security profit that an attack is determined early on.”


Some sections of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Adult Google Ad Fraud Campaign Garnered Millions of Impressions
Next Post: The Rise of the Rookie Hacker – A New Trend to Reckon With the rise of the rookie hacker a new trend»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless
  • Podcast transcript: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.