• About
  • Subscribe
  • Contact
Thursday, May 1, 2025
    Login
FutureCFO
  • Business Insights
    • Competencies and Capabilities
    • Digital Transformation
    • Leadership and Roles
    • Mergers and Acquisitions
    • Risk and Regulation
    • Strategies and Tactics
  • Operations
    • Audit and Compliance
    • Finance Accounting and Reporting
    • Operational Accounting and Control
    • Tax Management and Optimization
    • Treasury and Cash Management
  • Technology
    • Artificial Intelligence
    • Automation
    • Big Data
    • Blockchain
    • Business Applications
    • Cloud, Platforms and Ecosystems
    • Future Technology
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
  • Awards
  • Knowledge Hub
    • Sustainable Finance
No Result
View All Result
  • Business Insights
    • Competencies and Capabilities
    • Digital Transformation
    • Leadership and Roles
    • Mergers and Acquisitions
    • Risk and Regulation
    • Strategies and Tactics
  • Operations
    • Audit and Compliance
    • Finance Accounting and Reporting
    • Operational Accounting and Control
    • Tax Management and Optimization
    • Treasury and Cash Management
  • Technology
    • Artificial Intelligence
    • Automation
    • Big Data
    • Blockchain
    • Business Applications
    • Cloud, Platforms and Ecosystems
    • Future Technology
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
  • Awards
  • Knowledge Hub
    • Sustainable Finance
No Result
View All Result
FutureCFO
No Result
View All Result
Home Business Insights

CFOs: Do you have these security misperceptions? (Part 2 of 2)

FutureCFO Editors by FutureCFO Editors
July 1, 2021
security

Image by Tumisu on Pixabay

Let’s continue with the last five of the top 10 security misperceptions today.

To revisit or view the first half of the top 10 security misperceptions, you can check them out here.

These misperceptions need to be understood not only by the IT function, but also senior executives such as the CFO to protect an organisation from financial losses and reputation damage brought by security incidents.

According to Sophos, the remaining misperceptions are as follows:

Misperception 6: We are not a target; we are too small and/or have no assets of value to an adversary
It doesn’t matter how small you are, if you have processing power and a digital presence, you are a target. 

The attackers will seek for the opportunities which the organizations are involving into the security gaps, errors or misconfigurations that cybercriminals can easily exploit. 

Misperception 7: We don’t need advanced security technologies installed everywhere
The assumption that protected endpoints can prevent intruders from making their way to unprotected servers is a mistake.

According to the incidents Sophos Rapid Response has investigated, servers are now the number one target for attack and attackers can easily find a direct route using stolen access credentials.

If your organisation relies only on basic security, without more advanced and integrated tools such as behavioural and AI-based detection and a 24/7 human-led security operations center – then intruders will likely find their way past your defenses eventually.

It is always worth remembering that while prevention is ideal, detection is a must.

Misperception 8: We have robust security policies in place
Having security policies for applications and users is critical. 

However, they need to be checked and updated constantly as new features and functionality are added to devices connected to the network. 

Verify and test policies, using techniques such as penetration testing, tabletop exercises and trial runs of your disaster recovery plans. 

Misperception 9: Blocking IP addresses from high-risk regions such as Russia, China and North Korea protects us against attacks from those geographies 
Blocking IPs from specific regions is unlikely to do any harm, but it could give a false sense of security if you rely only on this for protection. 

Adversaries host their malicious infrastructure in many countries, with hotspots including the US, the Netherlands and the rest of Europe. 

Misperception 10: Remote Desktop Protocol (RDP) servers can be protected from attackers by changing the ports they are on and introducing multi-factor authentication (MFA) 
The standard port used for RDP services is 3389, so most attackers will scan this port to find open remote access servers. 

The scanning will identify any open services, regardless of the port they are on, so changing ports offers little or no protection on its own. 

RDP activity should take place within the protective boundary of a virtual private network (VPN), but even that cannot fully protect an organization if the attackers already have a foothold in a network. 

Ideally, unless its use is essential, IT security should limit or disable the use of RDP internally and externally.

Related:  Cyber attacks and data loss top concerns facing directors and officers
Tags: cybersecuritySophos
FutureCFO Editors

FutureCFO Editors

No Result
View All Result

Recent Posts

  • Modernising Days Sales Outstanding (DSO) for 2025
  • A Day in the Life: Shelly Maneth from Red Hat Asia Pacific
  • Singapore Inc: Expanding horizons in ASEAN and beyond
  • Technology essentials for the modern CFO
  • Transforming budgeting through automation

Categories

  • Artificial Intelligence
  • Audit and Compliance
  • Automation
  • Big Data
  • Blockchain
  • Business Applications
  • Business Insights
  • Case Studies
  • Cloud, Platforms and Ecosystems
  • Competencies and Capabilities
  • Digital Transformation
  • eBooks and eBriefs
  • ESG and sustainability
  • Finance Accounting and Reporting
  • Future Technology
  • General
  • Infographics
  • Leadership and Roles
  • Mergers and Acquisitions
  • Operational Accounting and Control
  • Operations
  • Polls and Surveys
  • Resources
  • Risk and Regulation
  • Strategies and Tactics
  • Tax Management and Optimization
  • Technology
  • Treasury and Cash Management
  • Videos/Tutorials
  • Webcasts/Podcasts
  • White Papers

Strategic Insights for Finance Executives

FutureCFO.net is about empowering the CFO and the Finance Team to take on the leadership position in the digitalization of the enterprise. It's more than just a portal for the exchange of industry best practices, it is about creating and growing a community of finance professionals able to share learned experiences, providing a platform for the current and next generation of finance leaders and professionals.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Business Insights
    • Competencies and Capabilities
    • Digital Transformation
    • Leadership and Roles
    • Mergers and Acquisitions
    • Risk and Regulation
    • Strategies and Tactics
  • Operations
    • Audit and Compliance
    • Finance Accounting and Reporting
    • Operational Accounting and Control
    • Tax Management and Optimization
    • Treasury and Cash Management
  • Technology
    • Artificial Intelligence
    • Automation
    • Big Data
    • Blockchain
    • Business Applications
    • Cloud, Platforms and Ecosystems
    • Future Technology
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
  • Awards
  • Knowledge Hub
    • Sustainable Finance
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe