Pub Date : 2022-12-01DOI: 10.12968/s1361-3723(22)70605-7
Bec McKeown
Our fears about being targeted by a cyber attack are understood – and exploited – by malicious actors. This is why, in building your defences against attacks – especially ransomware – you need to consider the psychological factors.
{"title":"The psychological problem with ransomware","authors":"Bec McKeown","doi":"10.12968/s1361-3723(22)70605-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70605-7","url":null,"abstract":"Our fears about being targeted by a cyber attack are understood – and exploited – by malicious actors. This is why, in building your defences against attacks – especially ransomware – you need to consider the psychological factors.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"225 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90071152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.12968/s1361-3723(22)70603-3
G. Golan
Organisations rely on a number of suppliers to provide a wide range of security solutions and services. This creates complexity that attackers can exploit. So what can we do about this?
{"title":"Why do we silo cyber security when criminals don't?","authors":"G. Golan","doi":"10.12968/s1361-3723(22)70603-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70603-3","url":null,"abstract":"Organisations rely on a number of suppliers to provide a wide range of security solutions and services. This creates complexity that attackers can exploit. So what can we do about this?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83898965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.12968/s1361-3723(22)70600-8
James Richardson
Working from home has increased fraud in the UK and the US. At the same time, the amount and value of fraud has increased, according to recent figures. This means that companies must be extra-vigilant as our ways of working continue to evolve.
{"title":"Minimising fraud in a post-Covid world","authors":"James Richardson","doi":"10.12968/s1361-3723(22)70600-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70600-8","url":null,"abstract":"Working from home has increased fraud in the UK and the US. At the same time, the amount and value of fraud has increased, according to recent figures. This means that companies must be extra-vigilant as our ways of working continue to evolve.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88948800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.12968/s1361-3723(22)70602-1
Matt Tengwall
Beyond the human toll exacted by the Covid-19 pandemic, one of the most significant lasting impacts of the spread of the virus and its numerous variants will be how it fundamentally changed business operations for many industries, and banking is no exception. As work and consumer habits due to the pandemic, financial institutions must evolve their security programmes accordingly.
{"title":"A new era of bank security challenges","authors":"Matt Tengwall","doi":"10.12968/s1361-3723(22)70602-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70602-1","url":null,"abstract":"Beyond the human toll exacted by the Covid-19 pandemic, one of the most significant lasting impacts of the spread of the virus and its numerous variants will be how it fundamentally changed business operations for many industries, and banking is no exception. As work and consumer habits due to the pandemic, financial institutions must evolve their security programmes accordingly.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81390850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.12968/s1361-3723(22)70599-4
Katie Petrillo
The whole world has gone through a digital transformation, radically changing the nature of work. But are individual employees properly prepared for this change? And are they being given the protections they need to keep themselves – and the organisations they work for – safe?
{"title":"Securing the organisation by protecting the individual","authors":"Katie Petrillo","doi":"10.12968/s1361-3723(22)70599-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70599-4","url":null,"abstract":"The whole world has gone through a digital transformation, radically changing the nature of work. But are individual employees properly prepared for this change? And are they being given the protections they need to keep themselves – and the organisations they work for – safe?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.12968/s1361-3723(22)70598-2
Henry b. Harrison
As cyber criminals and their tools become more sophisticated, organisations are becoming increasingly reliant on their first line of defence – their staff – to combat threats. This requires a high level of awareness. But is it reasonable to expect employees to have such an advanced understanding of the dangers?
{"title":"Preventing ransomware – doing the impossible?","authors":"Henry b. Harrison","doi":"10.12968/s1361-3723(22)70598-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70598-2","url":null,"abstract":"As cyber criminals and their tools become more sophisticated, organisations are becoming increasingly reliant on their first line of defence – their staff – to combat threats. This requires a high level of awareness. But is it reasonable to expect employees to have such an advanced understanding of the dangers?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90835648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.12968/s1361-3723(22)70601-x
Erick Barnes
{"title":"Mind the gap between cyber security spend, budgets and awareness","authors":"Erick Barnes","doi":"10.12968/s1361-3723(22)70601-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70601-x","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72945719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.12968/s1361-3723(22)70595-7
Phishing attacks have surged in waves over the past 18 months, capitalising on the fear and uncertainty caused by the Covid-19 pandemic. Yet these media-publicised waves overshadow the fact that phishing attacks, year over year, have continued their inevitable climb to reach peak numbers through pandemic-related topics
{"title":"The rise of phishing: what your staff needs to know","authors":"","doi":"10.12968/s1361-3723(22)70595-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70595-7","url":null,"abstract":"Phishing attacks have surged in waves over the past 18 months, capitalising on the fear and uncertainty caused by the Covid-19 pandemic. Yet these media-publicised waves overshadow the fact that phishing attacks, year over year, have continued their inevitable climb to reach peak numbers through pandemic-related topics","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88707008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.12968/s1361-3723(22)70593-3
Patricia A. Nevin, K. Renaud, George Finney
The move to ‘digital first’ has led to increasing dependence on online services, which increases susceptibility to security incidents. 1 Human behaviours can compromise organisational information security, with myriad perpetrators willing to exploit the human propensity to trust in order to achieve such compromises. 2 Phishing emails – which present recipients with an email containing a fraudulent link or a rogue attachment that can lead to the installation of malware or facilitate a ransomware attack – are a key attack vector. But encouraging users to slow down when processing emails can help combat this threat.
{"title":"Slow down and frown to improve phishing detection","authors":"Patricia A. Nevin, K. Renaud, George Finney","doi":"10.12968/s1361-3723(22)70593-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70593-3","url":null,"abstract":"The move to ‘digital first’ has led to increasing dependence on online services, which increases susceptibility to security incidents. 1 Human behaviours can compromise organisational information security, with myriad perpetrators willing to exploit the human propensity to trust in order to achieve such compromises. 2 Phishing emails – which present recipients with an email containing a fraudulent link or a rogue attachment that can lead to the installation of malware or facilitate a ransomware attack – are a key attack vector. But encouraging users to slow down when processing emails can help combat this threat.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"321 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80233111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.12968/s1361-3723(22)70594-5
J. Fielding
{"title":"Waking up to the encryption advantage","authors":"J. Fielding","doi":"10.12968/s1361-3723(22)70594-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70594-5","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74618611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}