{"id":3836,"date":"2015-04-13T17:07:42","date_gmt":"2015-04-13T17:07:42","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3836"},"modified":"2020-02-26T11:01:18","modified_gmt":"2020-02-26T16:01:18","slug":"cybersecurity-education-in-enterprise-not-only-for-security-employees","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-education-in-enterprise-not-only-for-security-employees\/3836\/","title":{"rendered":"Cybersecurity education in enterprise: not only for security employees"},"content":{"rendered":"<p>Cybersecurity has become everyone\u2019s business, and it raises demand for\u00a0continuous updates of information for everybody, both high-level security professionals and common corporate users. And especially for the latter, since it is this group that\u00a0criminals attack most of the time.<\/p>\n<p><b>Pros and\u00a0cons<\/b><\/p>\n<p>Cybersecurity is supposed to be mainly a field of responsibility for dedicated professionals, and apparently this isn\u2019t going to change any time soon. It\u2019s hard to expect an accountant to have equal prowess in the area of cybersecurity as a\u00a0seasoned cyberforensics expert, who spent years worth of time\u00a0to become what he is.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Cybersecurity #education in enterprise: not only for security employees #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fyif5&amp;text=%23Cybersecurity+%23education+in+enterprise%3A+not+only+for+security+employees+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It would be unfair, though, not to mention that today\u2019s common users often are capable of doing with their PCs (and handhelds) what they weren\u2019t expected to do ten or more years ago, and today\u2019s accountant may know a lot about computers, software and even have some additional specialty knowledge (such as setting up a wireless network at home or in a small office). Still, it won\u2019t make him capable of changing his career and\u00a0becoming an IT security professional. The difference in expertise is still vast: it\u2019s \u201cI know a thing or two\u201d vs. \u201cI have worked in the field for many years\u201d.<\/p>\n<p>At the same time, speaking of field of responsibility, by \u201cmainly\u201d we don\u2019t mean \u201cexclusively\u201d. In fact, it\u2019s not professionals those are targeted by the criminals and APT groups, rather, it\u2019s common users. They and their PCs, devices and the data they work with are essentially the new \u201cendpoints\u201d, and if we add a bit of bombast here, a battlefront of sorts.<\/p>\n<p><b>The battle rages on and on<\/b><\/p>\n<p>Indeed a battlefront, given the amount of new threats detected daily \u2013 <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2014\/Kaspersky-Lab-is-Detecting-325000-New-Malicious-Files-Every-Day\" target=\"_blank\" rel=\"noopener nofollow\">325,000 new malware variants<\/a>, according to our recent stats. Whether the common corporate users are aware of these threats and whether they can ensure at least basic security of their data and devices, can affect overall business\u2019 security immensely.<\/p>\n<p>Cyberthreats are growing in number and sophistication, however, essential entry points remain the same: all kinds of phishing and other trickery to dupe clueless users into (most likely unwilling) \u201ccooperation\u201d such as running the malware or opening an\u00a0exploit-ridden Word document. How good the users are at countering this trickery depends exactly on their awareness. And the amount of new malware clearly indicates that the awareness on average really could use some improvement, otherwise there would be\u00a0much fewer\u00a0threats and cybercriminals would tell each other fewer \u201csuccess stories\u201d.<\/p>\n<p><b>Attackers are not geniuses<\/b><\/p>\n<p>It\u2019s worth mentioning, though, that, again on average, cybercrime today <a href=\"https:\/\/business.kaspersky.com\/high-tech-crimes-not-too-high-after-all\/2393\" target=\"_blank\" rel=\"noopener nofollow\">isn\u2019t too advanced<\/a> \u2013 it\u2019s quite accessible to mediocre minds. In fact, it is enough to know where to buy and download your next banking Trojan, and how to spread it out. Not much of a creative work. But still it doesn\u2019t decrease the menace; otherwise, with the cyberunderground becoming overcrowded, more advanced criminals have to come out with more and more competitive \u2013 and dangerous \u2013 crime tools.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Common corporate users are the main target of attacks #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fyif5&amp;text=Common+corporate+users+are+the+main+target+of+attacks+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><b>Software and knowledge update<\/b><\/p>\n<p>There is\u00a0a necessity for\u00a0continuous education of both IT specialists and common users, since who knows what they are going to encounter tomorrow? What kind of \u201cexotics\u201d? At the entry point there may be none: still the good old-fashioned Trojans, phishing, social engineering \u2013 methods don\u2019t change much, and the \u201ccommon\u201d users should be capable of dealing with it. But if they fail, well\u2026 There comes the actual complexity and sophistication, hard work for cyberforensic experts who will have to identify and neutralize the source of the threat slipped into the corporate network. But first they have to know where and what to look at.<\/p>\n<p>In other words, the awareness of both IT professionals and the end-users should be updated regularly, just like software. Again, those are software vulnerabilities and human mistakes \u2013 separately or together \u2013 those make malware effective and cyberattacks successful.<\/p>\n<p>Take a look <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/?cid=GL:SOCIAL_MEDIA:blog\" target=\"_blank\" rel=\"noopener nofollow\">at this resource<\/a> to find out more on Enterprise Security challenges and the ways to handle them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cybersecurity has become the everyone\u2019s business, and it raises the demand for continuous update of information for everybody, both high-level security professionals and common corporate users. And especially for the latter, since it is them criminals attack most of the time. <\/p>\n","protected":false},"author":209,"featured_media":15707,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[346,2301,97],"class_list":{"0":"post-3836","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-education","10":"tag-enterprise","11":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-education-in-enterprise-not-only-for-security-employees\/3836\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cybersecurity-education-in-enterprise-not-only-for-security-employees\/3836\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cybersecurity-education-in-enterprise-not-only-for-security-employees\/3836\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/education\/","name":"Education"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3836"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3836\/revisions"}],"predecessor-version":[{"id":33503,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3836\/revisions\/33503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15707"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}