The 2024 Cyber Security Employee Handbook - Field Effect
The 2024 Cyber Security Employee Handbook - Field Effect
employee
cyber-
security
handbook
Your go-to guide for
security tips and intel
F I E L D E F F E C T. C O M
Table of
contents
Your role in cybersecurity 3
Social engineering 4
Common social engineering techniques 5
Malware 6
Conclusion 11
Your role in
cybersecurity
From the CEO to the newest hire, Additionally, cybercriminals are also taking advantage of
cybersecurity is a responsibility for the efficiencies and advancements brought to us by new
everyone in the company—not just the IT AI tools and technologies.
team. There are a few reasons why.
Third, people are often the weakest link in cybersecurity.
The first is that there are more opportunities than ever Despite organizations spending billions1 on security
for an attack. Threat surfaces have increased in size— measures each year, attacks still happen. People make
every device or account you use represents a potential mistakes, and attackers capitalize on this.
area of attack.
But the thing is: knowledge truly is power. This handbook
Second, the tools needed to launch an attack have holds all the critical information you need to know about
become more accessible than ever, thanks to the cyberattacks—including the techniques and tactics
growth in cybercrime-as-a-service markets. Anyone adversaries use—and best practices to stop threat actors
with ill intent and a few dollars to spare can access in their tracks.
the software necessary to stage an attack.
Social engineering
At its core, social engineering is manipulation.
Common social
engineering techniques
AI tooling has made crafting message lures easier. They prey on your need for
Threat actors can feed all the relevant information into information
their tool of choice and, within seconds, have believable In phishing attacks, attackers may encourage you to open
messaging in any language they wish. their email by falsely offering new information. The
attacker purposefully designs the scam to pique your
But whether they use AI or not, cybercriminals still rely curiosity, as you may be more likely to open files or links
on a few key techniques for their social engineering to gain that information.
scams. Let’s dig into some of the specific techniques
used in social engineering scams:
E X A M P L E:
You receive an email from what looks like your bank,
offering information about new interest rates. It
They impersonate authority could impact your finances, so you open the file. But
figures or someone you trust it’s malware, and you’ve unknowingly granted the
As we’ve already briefly touched on, attackers will often attacker access to your device.
pose as a high-ranking executive you know and trust,
such as the CEO. Disguised as someone else, the
attacker may ask you to send a wire transfer, company
credentials, or other confidential information. They use fear or urgency to
pressure you to act
This technique is effective for two main reasons:
Attackers design phishing campaigns using limited time
offers or with tasks requiring urgent action. Despite
■ You’re more likely to open an email from your CEO
knowing better than to open a link without first
than a stranger.
inspecting it, you may follow directions haphazardly if
■ You’re less likely to question a request from an you feel pressured to act quickly.
authority figure.
E X A M P L E:
E X A M P L E: You receive an email, seemingly from a recognized
You receive a seemingly urgent email from your brand, offering $1000 to the first ten people who sign
manager, the CFO. She’s stuck in a meeting that’s up for their newsletter. You register, willingly giving
running late and needs you to issue a payment to a the attacker key personal information, as well as
new vendor with all the key financial information to banking information for where they should send
do so. Unfortunately, the email isn’t really from that $1000.
your CFO and that “new vendor” is actually a threat
actor’s banking account.
E X A M P L E:
It’s tax season, and you receive an email from what
appears to be your finance department. They’re
sending you a PDF that outlines what they need to file
taxes for the company on time.
Malware
Malware has become ubiquitous in cybersecurity. And
while it’s difficult for those less-technical to know if
malware infected their system, anyone can improve their
cyber defenses by recognizing how it’s delivered.
Follow
cybersecurity
best practices
Modern work requires you to use email, cloud applications, and the
Internet—all of which add security risks. That’s why following best
computing practices is critical, no matter the size of the company
you work for, where you work from, or the type of work that you do.
FAK E
apps, and cloud-based services to enable remote work,
we must consider the new opportunities they present
for attackers.
Build a security-first
culture
Cybersecurity cannot be a check-the-box activity; it UPD ATIN G
needs to be an ongoing commitment. Ensure this by
integrating security as a company value and as part of
the culture.
SOURCES
Sources …
•
•-€ †
‚-• •
1. https://report.yerbo.co/
• „
2. https://www.nist.gov/cyberframework/online-learning/five-functions „
•†…
• • „‡
•
ƒ „•
ƒ
12
Your printable
cybersecurity checklist
Cybersecurity is critical to the success of the company; defending against modern threats
is everyone’s responsibility. The good news is you don’t need to be an expert with years of
security experience to help protect yourself and your organization.
Print out this checklist and hang it up in your office—whether that’s at home or work. Let it be a
reminder of your role in keeping the company safe and a test to ensure you’re still following
cybersecurity best practices!
AUSTRALIA
+61 1800 431418
F I E L D E F F E C T. C O M