Cyber security - a medicine against technology-related anxiety?

Cyber security - a medicine against technology-related anxiety?

The average time between cyber-attacks is estimated to be only 39 seconds, leaving a lot of us feeling like sitting ducks. Can technology be of help here?

The letter contained a scarce explanation of a data breach and money being stolen. “We are deeply sorry to inform you…”. Mr. Somchai lost his whole paycheck. 

Disgruntled, the 60-year-old decided to give up the convenience of online banking. Now he goes through a hassle of visiting a bank branch every time he needs to make a transfer. He has learned the hard way about the vulnerability of systems that handle our private data. What he knows now is that there is a risk out there on the web, but what he doesn’t know, is that he could have avoided it.

In 2019 cyber-crime has made $1.5 billion profit and had a heavy psychological impact on the millions of people whose private data was stolen by hackers. 

When you register yet another online account, are you confident that your hard-earned cash is safe? That no one can use your personal data for wicked purposes? That miles you have been collecting won’t be sold for a couple of dollars to some stranger on the dark web?

There are two sides to a coin and there are two sides to every innovation. Technology-related stress and anxiety might be the dark side of an e-lifestyle. So what can you do to feel that you are still the sole proprietor and master of your own data?

You wouldn’t expect a jewellery store to be protected only by a lock and key. Your corporate and personal data are as valuable as gold and diamonds, therefore using only basic measures as username and password is not enough. Passwords are supposed to make your data secure, yet any regular cybercriminal can break them with a couple of clicks. 

At Comarch, we support the policy of a secure digitization with full commitment. The first step to creating a secure system environment lies in managing access to various structural components of your organisation. 

The Identity & Access Management solution can bind credentials of your employees to specific systems, time and place of use. It allows for setting conditions that must be met in order to log in from a specific device or location. Equally important is giving your customers tools to protect themselves against cyber-attacks. Even the most unbreakable interface will not protect the money, miles, or credit card information if a customer accidentally passes on account details to hackers. A two-factor authentication tool (2FA) will keep your data secure from unauthorised access. 

The first factor refers to a simple measure, for example, password input. The second one indicates an additional layer of security, for example assigning a specific mobile device, card or token to a given user. There can be more, almost unnoticeable verifications, like fingerprint or face scan. Deciphering a password is awfully easy, but obtaining an actual physical device bonded to a user account or stealing a biological trait is not. And this is exactly why 2FA is considered one of the most trustworthy security methods available. It is a cost-effective and user-friendly solution. Even if you lose a mobile device or your password is stolen, 2FA provides your company with plenty of time to resolve the issue before any damage is done.

Same as keys to our doors, passwords have been with us for ages, but that doesn't mean that we can rely solely on them to protect our valuable assets. The second factor reinforces passwords in a unique way and helps customers control the use of their data better. Hiding a long password in a notebook under a pile of other documents is just not enough. But nowadays the logging experience can be seamless, yet more secure than you have ever imagined. 

Julia Poiata, Business Development Manager

Want to learn how to combine security and convenience? Download white paper

Do you like the content of this article?
COMMENT (2)