Created by - Cignes Myjamia
What is cyber security?Cyber security is a system of technologies and protocols developed to shield necessary computing resources, electronic networks, and sensitive data against malicious attacks. Although the term cyber security appears highly technical, its application is relatively universal in the current digitalization climate. Data encryption, password authentication, and network perimeter are examples of standard protective mechanics against offensive threats and malware technology that users encounter daily. Here, we discuss the top reasons why cybersecurity is important for information technology (IT), especially in 2022.1.Cyber-attacks do not discriminateDecades ago, rumors falsely reassured personal computer users that only mega-corporations and financial institutions would be the targets of cybercrimes. Unfortunately, as computers and internet networks have evolved from a privilege to a daily necessity, cybercrimes have become much more common. A Clark School study at the University of Maryland found that, on average, hackers attempt to breach computers with internet access every 39 seconds. While fictional media often portrays dramatic scenes of targeted cybercrimes, the reality is that an automated script randomly searches for computer vulnerabilities, causing harm and stealing critical data. 2. Sensitive data is becoming more digitized There is an unprecedented surge of collected and analyzed data following the digitalization of various economic and social life sectors. How people interact through social media and how organizations interconnect with their clients have changed dramatically. Instead of opting for outdated pen and paper documents, technology offers the ease of convenience for information transfer and storage on a cloud-based system. This heightened connectivity increases the regularity of compromised, stolen, and leaked sensitive information like personal data, trade secrets, and bank account details.3. A boom in e-commerce indicates a boom in cyber threatsCOVID-19 caused a series of changes to trade retailers, resulting in their adaptation to the e-commerce sector. With state-level lockdowns and social distancing protocols in force, consumers turned to online shopping. Digital Commerce 360 revealed that North America’s leading online merchants experienced a collective growth of 45.3% in 2020. In an e-commerce transaction, businesses hold access to sensitive intellectual property and customer data, including communication details, addresses, customer behavior, credit card information, and supply chain storage. Any security breach of this data can cause significant information spillage and damage to the marketing processes. But these problems are avoidable with an appropriate cyber security installment.
More DetailsPublished - Fri, 04 Nov 2022
Created by - Cignes Myjamia
The nature of jobs and businesses is changing at an unprecedented pace. This has resulted in a large number of unemployable educated youth. Even for existing employees, L&D managers find it a challenge to design and deliver development programmes which can re-skill them at such a pace. An L&D study conducted in 2019, reveals that organisations with highly engaged employees are over twice as likely to prioritize soft skills training. It is no surprise that the only common denominator in several L&D studies conducted since the 90s has been the importance of soft skills.Jobs of the future As industry gets more and more automated, the human jobs of the future are going to be those which rely on soft skills and the human touch. There is a growing emphasis on customer service, and impactful and professional communication skills will be in even greater demand in the new age of AI. Increasingly, jobs require greater creativity, collaboration and relationship building. This is also reflected in what we hear from our clients: more than academic qualifications, it is the ability to be creative in high pressure situations that businesses need.Talent pipelineA recent Bersin study found only 6% organisations feel their leadership pipeline is ready and 86% companies across the world cite “gaps in their leadership pipeline” as one of their top 3 issues. Our work with corporate organisations reveals that many employees get stuck at middle management, not for lack of their technical abilities, but due to lack of soft skills which impedes their ability to be in leadership and strategic roles. Soft skills, or what are called 21st century skills, improve the ability to interpret data quickly, assess a situation and then come to a decision. Future leaders need these skills. Not just be knowledgeable, they need to work with others -- communicate, cooperate, collaborate, and more challenging, inspire!A good learner doesn’t look very different from a star employeeThe hallmark of a good soft skills training programme is not just imparting knowledge and building skills, but also developing the ability to self-reflect and self-learn. Sounds familiar? Those are exactly the skills that businesses need to foster in their employees across the board and is what makes our training method so effective. Managing the 10%Does L&D in your organisation follow the golden 70:20:10 ratio? While planning the 10%, remember to include an adequate focus on soft skills. The following soft skills are essential to any L&D plan:Diversity and inclusion: Skills such as working effectively in a diverse environment and avoiding unconscious bias can add intercultural fluency to your organisation’s value proposition. Training your employees in this area sends a strong message about organisational values, promotes a good work culture and can help avoid HR and PR disasters in the era of movements such as #metoo. Interpersonal communication: Communication effectiveness enables organisational effectiveness. Many studies on customer facing teams have shown that top performers have better English skills compared to the rest of the team. In our experience as well, English training has a direct impact on CSAT scores. Productivity and performance: Equip your employees with the skills and awareness they need to be part of high performance teams. You can train them to be able to build meaningful relationships for your business, to run productive meetings and manage their own time effectively. Customer service: Make sure your employees are able toempathise with and delight your customers, and that your customer service to truly adds to your brand value proposition. Leadership communication: Your ability to deliver in a challenging and changing environment depends on your current and future leaders’ ability to inspire their teams and customers. Train them on the art of strategic business storytelling, creating their executive presence, and coaching and mentoring.Soft skills and communication skills training solutions are the need of the hour and must be modern, effective, scalable and digitally-enabledfor maximal outreach. This training is needed by all organisations - government organisations, leading private sector companies and educational institutions across the world.
More DetailsPublished - Sat, 05 Nov 2022
Created by - Cignes Myjamia
Digital skills once meant having a basic grasp of computers. Now, it means being able to work adaptably and strategically across tools, devices and platforms.Digital literacy used to mean being able to send an email or type using a word-processing programme. It was a skill largely required of knowledge workers – people who might use specific software at work, and need to be fluent in how to use it accordingly. But the phrase has evolved significantly. Now, digital literacy means having the skills to thrive in a society where communication and access to information are increasingly done via digital technologies, such as online platforms and mobile devices. The concept encompasses a broad understanding of an array of digital tools that enable in-office, hybrid and remote work across all types of workplaces: think real-time collaborative software, live workplace chat apps and sophisticated asynchronous work tools. Today, digital literacy is no longer a functional proposition, it’s a mindset. In the modern workplace, there is a greater expectation for employees to nimbly adopt whatever technology comes with their job as well as adapt to ever-changing tools and approaches. Workers are also expected to use technology strategically: from working off their personal mobile devices, to leveraging collaborative workflow programmes. And, importantly, digital skills are no longer essential only in knowledge work. “These are becoming universally applicable to almost everyone,” says Ying Zhou, director of the Future of Work Research Centre at the University of Surrey, UK. By 2019, a UK government report showed digital skills were required in at least 82% of online advertised vacancies. Zhou says workers who stand still and stop acquiring digital expertise risk falling behind. “Every time technology is developed it pushes up the workforce’s skill requirements. It becomes a race between digital skills and technology: the faster it advances, the quicker we have to update our skills. The bar is being raised all the time.” Why everyone needs digital literacy “Digital literacy is a broad concept: you can work with digital devices from simple ways to high complex tasks,” continues Zhou. “It can vary from printing out an invoice in a shop, to using word processors and spreadsheets, to advanced use like web design, data analysis, computer programming and coding.” Job market demand for digital literacy has grown consistently since the 1980s. Zhou cites research showing that while demand for literacy and numeracy skills among the UK workforce has plateaued, roles requiring digital skills have continued to rise. Over time, a degree of digital expertise has become expected even in roles unrelated to tech. From warehouse operators using cloud-based management systems, to doctors consulting with patients via remote video appointments, and contractors managing construction projects through mobile collaboration apps, technology is no longer sector-specific. “Digital literacy – and employers’ demand for digital skills – has evolved as the economy and labour market has become more digitised,” says Danny Stacy, UK head of talent intelligence at hiring platform Indeed, based in London. “What used to be seen as a bonus is now a critical component of virtually every role.”
More DetailsPublished - Sat, 05 Nov 2022
Created by - Cignes Myjamia
You probably can't provide security for workers at home that matches that of your office, but you can come close. Here are some ideas.When the COVID-19 quarantine hit in mid-March, it created an unprecedented situation in which the number of remote workers skyrocketed beyond anything anticipated."The only analogue of this scale I would say is 9/11, and that was fairly regional," says Sean Gallagher, a threat researcher at Sophos. "It wasn't a national thing like this is, and it wasn't nearly for this period of time."Gallagher was working remotely from Baltimore for a New York company. All his fellow employees in New York were displaced for several weeks."We had to figure out how to operate without the office for nearly a month," he says. "But that was very regionally specific. This is a much broader problem."Regional vs. globalThe nearest thing most companies may have experienced to COVID-19 is something like a hurricane or other natural disaster, all of which are regional. This crisis has scaled beyond any plans companies had in place to deal with remote workers—and with that has come a level of insecurity that has also been unimaginable."It's not something that might've been in most companies' disaster recovery continuity business plan," says Gallagher. "But it is certainly not unprecedented in terms of the need to be able to flexibly handle ongoing operations with employees not in the office."Moreover, the vast move to remote work is an exacerbation of the human element that "is often—frankly always—the most uncontrollable component of cybersecurity risk," says Bob Moore, director of server software and product security at Hewlett Packard Enterprise.All large organizations can arrange for some users to work from home, but until recently, few ever tried to have nearly everyone work from home. If existing security tools and procedures are inadequate, what do you really need to do to make the situation acceptable?
More DetailsPublished - Sat, 05 Nov 2022
Created by - Cignes Myjamia
Complexity, uniqueness, and periodic change have long been the top best practices for passwords, but new recommendations have led to changes around password policies.Passwords were supposed to fix authentication. Instead, they have become a source of significant problems. Users continue to choose weak or simple-to-guess passwords and reuse the same passwords on multiple services. They also tend to question restrictions: "Which of these rules are reasonable? Which are most effective? Why do we have all these requirements?" Password policies continue to evolve even if user attitudes have not. Experts suggest placing more emphasis on checking passwords against known weak password lists and focusing less on password expiration policies. Here are the current best practices in use:Set complexity requirements, such as meeting a character minimum, and use certain character types (mixed case, numerals, and special characters).Prevent users from choosing previously used passwords.Require passwords to be changed periodically and perhaps frequently.Check passwords against lists of most-common or especially weak passwords.Password standardsThe National Institute of Standards and Technology (NIST) addressed the question of password policies by issuing NIST Special Publication 800-63B (Digital Identity Guidelines – Authentication and Lifecycle Management). Section 5.1.1 “Memorized Secrets” has much to say about passwords and how they should be managed and stored. The requirements are actually pretty lenient: User-supplied passwords must be at least eight alphanumeric characters; passwords randomly generated by systems must be at least six characters and may be entirely numeric.NIST has been updating its standards and the most significant new requirement: The system must check prospective passwords against “a list that contains values known to be commonly used, expected, or compromised.” Types of passwords that might be disallowed based on such checks include:Passwords obtained from previous breachesDictionary wordsRepetitive or sequential characters (e.g., aaaaaa or 1234abcd)Context-specific words, such as the name of the service, the username, and derivatives thereofTo confuse the issue, NIST's recommendations are not specifically required; there is no organization whose role is to enforce these policies, and NIST's guidelines explicitly recommend against complexity requirements.The rest of the NIST recommendations are smart measures based on common sense and real-world experience. For example:The system should allow paste functionality on password entry, to facilitate the use of password managers.Passwords should not be stored; the system should store a salted hash—the addition of random data in a one-way password hash—of the password.The key derivation function to generate the salted hash should include a “cost factor”—something that takes time to attack, reducing the chances of a successful brute force attack.Finally, as I’ve long argued for, the system should permit the user to display the password as it is being entered, rather than just asterisks or dots. Usually this option is invoked by clicking an eyeball icon.Windows password policiesBecause the Windows domain password is the main password for users in so many enterprises, the default Windows policies are, at least, the starting point for most organizations. For many, there is no obvious reason to go any further than the defaults.The Windows default settings are not necessarily the same as those in the Windows Security Baselines, which are groups of policy settings “based on feedback from Microsoft security engineering teams, product groups, partners, and customers.” The baselines are included in the Microsoft Security Compliance Toolkit, which also includes policy-related tools for administrators. The Security Baselines serve as another very common setting, by virtue of being a Microsoft-endorsed configuration.The most interesting settings, at least recently, are the minimum and maximum password age. The minimum age is the number of days before users are allowed to change a password. The maximum is the number of days after which users must change their password. The default minimum is one day, both for Windows and the security baselines; the maximum defaults to 42 days for Windows and, until recently, 60 days in the security baselines. These settings are enabled in almost all default configurations.
More DetailsPublished - Sat, 05 Nov 2022
Created by - Cignes Myjamia
The race to stay ahead in an increasingly digital worldWe explore all that's needed to make your digital transformation successful—from strategies for your workforce to how to ensure your tech is secure.One undeniable effect of the pandemic is the sudden embrace of digital transformation. Enterprises of all types and sizes have sped up their digital plans to meet with the new reality: remote workforces, remote customers and partners, and just about everything needing to run digitally. Leadership teams everywhere have pulled projects off the planning schedule and put them into high gear.This issue of The Doppler is designed to help you navigate all that involves, from how to establish and achieve your main goals to ensuring that your systems are set up in the most secure way possible. We also reconsider the principles and guideposts of digital transformation itself, a worthwhile topic considering the various ways that people use the term digital transformation.
More DetailsPublished - Sat, 05 Nov 2022
Sat, 05 Nov 2022
Sat, 05 Nov 2022
Sat, 05 Nov 2022
Write a public review