Cyber Magazine July 2023 | Page 16

FIVE MINUTES WITH ...
Q . WHY IS FOLLOWING PROTOCOL SO IMPORTANT ?

» Contractors are also less likely to follow established security protocols to protect devices . According to the survey findings , 62 % of companies required contractors to adhere to security protocols during the onboarding process . Most gig workers surveyed reported complying with this requirement by using complex passwords that are regularly changed . While multi-factor authentication and firewalls were identified as top security measures contractors took to guard against cyberattacks , less than half of the respondents confirmed using these safeguards .

There are over 2,000 cyber attacks every day , leading to more than 800,000 people or businesses being compromised each year . One of the leading causes is human error , with 88 % of attacks attributed to mistakes . Failure to adhere to security protocols can thus have significant consequences .
Sadly , the research revealed that 76 % of freelancers had been hacked while working on a gig . This has resulted in 64 % having an average of US $ 260 stolen , usually by unauthorised purchases . At the same time , 60 % of gig worker usernames and passwords have been stolen , providing an access point for data theft .
Q . TELL US ABOUT THE IMPORTANCE OF PUTTING TRAINING FIRST ?

» Hacking attacks are frequently the result of employee mistakes , making those who use gig workers responsible for ensuring they are adequately trained in cybersecurity processes . Adversary methods change constantly , and we need to stay up-to-date with all the latest techniques . Prevention is better than a cure , so organisations should start with a robust security protocol and comprehensive training .

Training can be as simple as highlighting the potential harm of phishing scams , malware , and other forms of cyberattacks ; encouraging phishing-resistant multifactor authentication ; and teaching about the danger of clicking on unknown links or downloads . Better yet , organisations across the board should move to passwordless technology and phishing-resistant MFA for the internal systems that gig workers access . It is also worth ensuring you hire the right workers by joining the 69 % of businesses that perform background checks on gig workers . That helps avoid hiring someone with a history of cybercrime .
16 July 2023