Human firewall что это
During 2020, COVID-19 led many businesses to roll out rapid cloud migration and adopt remote working. Digital transformation was accelerated to improve collaboration and communication in the cloud. But as businesses continue to adapt to the challenges of the COVID-19 pandemic, robust IT security must remain a key priority.
In this blog, we’ll focus on one area of IT security often referred to as the ‘human firewall’ and explain why it should be playing a key role in any robust cybersecurity strategy.
Top areas of weakness to the human firewall
Phishing
Phishing attacks often revolve around emails sent to users containing malicious code. They try to trick users into giving away personal information such as log-in details. This might take the form of an email pretending to be from a reputable source, perhaps even within the organization, such as the CEO.
Cybercriminals are using the pandemic as a theme for their phishing campaigns—for instance, making use of emotive content such as daily death tolls. When people are confused and emotions are high, there is a greater risk of the momentary lapse of concentration required for a user to click on a malicious link. Phishing attacks are also increasingly being led by artificial intelligence, making them even more sophisticated, realistic, and harder to spot.
Areas of Weakness to the Human Firewall
1. Phishing
One of the most common ways to fall for a cyber attack, several employees have fallen for phishing attacks. Essentially knowing what kind of phishing attacks are currently circulating can help you reduce the risk of falling for them. Emails stating that your Facebook account may be disabled, and other similar emails should be ignored. Spear Phishing has become more popular as hackers and scammers have learnt how to make these attacks seem more legitimate with the use of personalised information. These attacks are more targeted and can thus be more dangerous too. Individuals must be made aware of the requests that are outside the norm and be able to detect signs of such attacks.
2. Theft/Loss
Another way that your network can become vulnerable is through theft or loss of devices. With the advent of work from home practices, bringing in your device has become more common these days. Individuals do not have any anti-theft protection and may not appropriately secure their devices. A mobile device that contains personal information related to the organisation must be secured well. Ensuring that the emails or information cannot be accessed on your phone by securing it with a facial recognition feature or fingerprint can help you be more careful.
3. Malware
The chance of malware being installed on your system is typically when you are browsing any compromised website. Sites that you may often visit also can be a victim of cyber attacks and have vulnerabilities. One of the most common ways through which malware is downloaded is through different popups on websites. It is important to train individuals regarding malware and how it works. Individuals should know how malware may be installed, which will go a long way in securing your network.
Education
A little bit of education can go a really long way when building your human firewall example. Get the employees at your company on board with protecting your companies network. It is really in their hands, and they should understand that fact. Enforcing ongoing security training is a great step in the right direction here. Security training can’t just be a one and done thing. It needs to be ongoing and should test the employees ability to spot a scam. Many programs, like the one we utilize for our clients, will send regular phishing emails to test an employees skills at recognizing them. If the link in the email is clicked, they are brought to a training page to help them understand what their mistakes were.
How to strengthen the human firewall
Theft/Loss
The last area that most commonly opens your company up to malicious attacks is theft or loss of devices. Bringing your own device to work has become extremely commonplace, especially now that many people have started working from home on personal devices. Often the employee doesn’t have the right kinds of anti-theft protection on their device, or isn’t securing their device properly. A cell phone with access to company files and emails needs to have a secure way to access it. So many high end phones now have fingerprint readers, or even the ability to scan your face to grant access to the device. Utilizing the security measures already in place on these devices will help protect your company in the event of loss or theft.
Company issued devices
With so many people working from home now, using a personal device is becoming more prevalent. These devices could already have malware on them, and might not have the proper security in place to access sensitive company data. Issuing devices to remote employees can really improve the entire security of your company. Not only will you be able to install the necessary security tools needed to keep the device secure, you will also be able to install other management and maintenance tools to make sure the devices remain up to date to prevent a malicious attack on your company data.
If you are located in the Salt Lake City area, and would like to learn more about how to protect your human firewall, or would like to have an assessment of your network security please contact us today to set up an appointment! Phone number: 844.796.1717 or email us at [email protected]
Protek Support also offers IT support in Utah.
Eric is the owner and CEO of Protek Support and is a CISSP (Certified Information Systems Security Professional). He graduated from Utah State University with a Bachelors of Science degree in Business with an emphasis in Information Technology (IT). He is an IT Services expert in a variety of technology related fields. Some of these fields include document management software/hardware, enterprise level networking and VoIP phone systems, as well as large scale software implementation projects and the setup of small business networks.
A group of people in an organisation that works towards detecting cyber attacks such as ransomware or phishing attacks that may bypass your computer security system are known as a human firewall. With the advent of the digital era and an increase in digitisation, the amount of data available has increased massively. An increase in data calls for a higher need for security.
A regular firewall is a device that blocks out the malicious traffic that may enter your system and cause a loss of vulnerable data. Similar to a firewall, a human firewall focuses on securing your network. It is necessary to train employees to effectively handle their data and ensure that the Company does not suffer any data loss. Human firewalls are important since they can help prevent major cyberattacks. Although they are the last line of defence, it is necessary to train them well and ensure that they are highly vigilant. Through this blog, we will learn more about the different areas of weakness to the human firewall. We will also learn how it can help in strengthening your security system.
Ways to strengthen your Human Firewall
1. Education
While building a human firewall, a little education can go a long way. First, you must bring all the employees at your Company onboard with the ways to protect the Company’s security system. Ongoing training related to security threats and best practices to avoid falling for these threats is essential. Sometimes while using tools for mass emailing, there are higher chances at your computer security being compromised. In such a situation, being educated about the do’s and don’ts will help you in the long run. You can also run an experiment in which you can fake a phishing email. If the individual is unable to identify this, they are redirected to a training page that will help them improve their knowledge regarding phishing and other cyberattacks.
2. MFA or 2FA
Multi-Factor Authentication or 2-Factor Authentication have become highly popular today. They are essential in strengthening the human firewall and giving individuals another layer of security in a cyber attack. A multi-factor authentication calls for individuals to secure their accounts by requiring two things, something they know and something they have. Something they know refers to the password, and something they have will either be their phone or a device where they can receive an OTP or a one-time password. Entering an individual’s password and then the OTP sent to your device will allow them to log in to the account. Ensuring that Multi-Factor Authentication and 2FA are in place will prevent hackers from logging into the individual’s account. While it is important to follow such human firewall practices, it is important to remember that this is not foolproof. Attackers may grow to be smart enough to generate codes.
3. Devices Issues by the Company
People are now more open to work from home policies and remote working, in such a situation, using personal devices for official work is becoming increasingly prevalent. Our devices might be more susceptible to malware and cyber-attacks. Ensuring that the right security measures are in place before using these devices for office work is important to secure our data. If the company issues devices for its individuals, it is easier to maintain security practices and install the necessary software and security tools to ensure security. With this in place, you will also be able to install and manage the tools remotely and increase your vulnerable data’s safety.
Thus, it is important to ensure that all organisations have a human firewall system and strengthen their security systems. If you found this blog helpful and wish to learn more such concepts about cybersecurity, join Great Learning’s Stanford Advanced Cyber Security Course and upskill today.
Much is said about staff being a company’s greatest resource…and this is true, great employees drive a business and make it successful. But employees are only human, and as such, they act as agents of both positive and negative change: in 2021, human error continues to cause most data breaches. However, employees also hold the key to positive change in the cyber security realm. Our staff are individuals, but collectively they can help to form a human firewall that stops cyber threats dead. Here is how…
Malware
Malware is typically installed when you are browsing a compromised website. Even a site you visit frequently can fall victim to a hack, leaving you vulnerable to attack when you visit. Pop-ups that inform you of an infection can often scare a user into downloading and installing malware. Training employees on how malware works, and the tricks they use to get you to install it, can go a long way to fight this type of vulnerability.
The Importance of Security in Business
Worksighted can help you stay ahead of threats. We offer a risk review assessment to provide an accurate understanding of your organization’s IT infrastructure, to help you identify potential security risks, and to promote security best practices.
However, the best place to start is with a free Power Hour with our IT security experts, who will discuss your business and current IT setup to define the best plan of action for your organization. Schedule your Power Hour today: it’s the fastest way to start tightening up your cybersecurity defenses.
We hope we have answered the question: what is a human firewall? For more information about how your organization can create a robust cybersecurity strategy, get in contact with the Worksighted team today.
Phishing
Phishing Attacks are probably one of the most common ways someone will fall for a scam. We’ve seen several smart employees recently fall for an email informing them that their Facebook page will be disabled. Understanding which phishing scams are currently in circulation can really help to avoid falling for them. As you become aware of the currently circulating phishing scams, your radar for identifying new ones will increase. Additionally, spear phishing attacks have also been climbing. These are more targeted attacks that use social engineering to find out details about a person to make their attack appear more legitimate. Spear phishing attacks are highly dangerous, and employees need to be made aware of some of the signs of an attack such as urgency and requests to do things outside the norm.
Human firewall для улучшения работы технических средств защиты
Большинство современных кибератак достигают цели не благодаря уязвимости операционных систем, программ и сетевого оборудования, а из-за небезопасных действий сотрудников. Социальная инженерия, фишинговые письма с вредоносной нагрузкой и фишинговые ресурсы для кражи учётных данных оказываются эффективнее, чем попытки обойти межсетевой экран или воспользоваться ошибкой удалённого выполнения кода в VPN-сервере.
Воздействуя на эмоции людей, преступники крадут учётные данные, с помощью которых могут проникнуть в сеть под видом легальных пользователей. Но можно обойтись и без кражи, убедив получателя письма открыть вложение и разрешить выполнение макросов. И если аргументы подобраны правильно, пользователь будет рад отключить защищённый режим и, по сути, дать доступ мошенникам «ради важного документа».
Для борьбы с современными атаками технических средств недостаточно. Требуется системная работа по развитию у пользователей навыков противодействия уловкам социоинженеров. В результате компания получит новый уровень защиты в дополнение к техническому, так называемый human firewall, или «человеческий межсетевой экран», который сработает как цифровой иммунитет в организации.
В этой статье мы поговорим о том, почему привычные способы внедрения мер кибербезопасности в бизнес-процессы оказываются малоэффективны и как сформировать работающий human firewall на практике.
ЦИФРЫ И ФАКТЫ
По данным Group-IB, с 2019 года фишинг прочно закрепился в топ-3 векторов первичной компрометации корпоративных сетей ввиду высокой эффективности и значительно меньших затрат на подготовку, чем исключительно технические атаки.
Самые громкие инциденты последних месяцев связаны с вымогательским ПО, причём успех атакам обеспечила эксплуатация человеческих слабостей.
7 мая 2021 года произошла кибератака на оператора крупнейшего в США топливопровода Colonial Pipeline. Злоумышленники использовали фишинговую схему для получения доступа к инфраструктуре компании: один из сотрудников перешёл по ссылке в фишинговом письме и заразил все информационные системы. Заплатив выкуп в размере 5 млн долларов США, компания получила неработающий инструмент для расшифровки данных.
9 июня 2021 года компания JBS, владелец крупнейшего в мире мясоперерабатывающего производства, выплатила преступной группировке Revil 11 млн долларов США за восстановление доступа к зашифрованным в результате кибератаки системам. Для проникновения операторы вымогателя применили комбинацию из фишинговых писем и похищенных с помощью фишинга учётных данных для служб удалённого доступа.
Ещё одна примета времени, которую отмечают эксперты, — это целевой характер кибератак на крупные компании, а также участие в них различных по специализации группировок, каждая из которых выполняет свои задачи:
- сбор информации;
- проведение фишинговых кампаний для кражи учётных данных;
- проведение фишинговых кампаний для загрузки в сеть жертвы вредоносного ПО;
- сбор конфиденциальных данных внутри сети компании, их кража и шифрование;
- переговоры о получении выкупа и распределение полученных средств.
Учитывая суммы выкупов, которые получают вымогатели, к подготовке очередной кибератаки они могут привлечь самые дорогие команды.
Неграмотные и нетренированные сотрудники чрезвычайно уязвимы к атакам с использованием продвинутой социальной инженерии. А это значит, что для защиты необходимо вложиться в формирование корпоративной киберкультуры и выработки у людей навыков безопасного поведения.
Но каким образом можно повысить уровень защищённости сотрудников и снизить вероятность успеха кибератак, построив human firewall?
ШАГ 1. ЗНАНИЯ
Стандартная для компаний практика после инцидентов кибербезопасности — обновление парка технических средств и проведение дополнительного обучения, информирования сотрудников. Некоторые организации приглашают экспертов для проведения тренингов по кибербезопасности, но чаще всё сводится к обучению с помощью электронного курса соответствующей тематики, например курса по безопасной работе с почтой или базового курса по информационной безопасности.
Окончив курс о безопасности электронной почты, сотрудники в лучшем случае будут знать, как действуют мошенники, в идеальном — по каким признакам можно отличить фишинговые письма от настоящих и как правильно действовать в случае, если обнаружена атака.
Для проверки знаний курс содержит итоговый тест, по результатам которого можно определить степень усвоения материала и при необходимости назначить дополнительное обучение.
Однако успешное прохождение итогового теста не означает, что полученные знания найдут применение в ходе реальных инцидентов. Проведённое компанией «Антифишинг» исследование поведения 20 тыс. пользователей различных организаций выявило интересный момент: после прохождения самых разных курсов навыки сотрудников улучшались лишь у 9% сотрудников.
Этот эффект хорошо знаком всем, кто сдавал экзамены в институтах: буквально через неделю после сессии даже у отличников в голове мало что остаётся.
Ещё одна яркая иллюстрация того, что знаний недостаточно для безопасного поведения, — недавний инцидент с генералом МВД, который перечислил телефонным мошенникам более 600 тыс. рублей. Крайне маловероятно, что высокопоставленный силовик не знал о подобных преступлениях, однако в реальной ситуации знания просто не сработали.
Важно, чтобы знания стали умениями и навыками, то есть чтобы сотрудники научились совершать осмысленные действия на базе полученных знаний.
ШАГ 2. УМЕНИЯ И НАВЫКИ
Единственный способ превратить полученные знания в умения и навыки — их отработка на практике. Пример — получение водительского удостоверения. Чтобы стать водителем, необходимо не только сдать теоретический экзамен, но и пройти практический курс вождения. И никого это не удивляет, ведь автомобиль — средство повышенной опасности.
В случае с навыками в сфере информационной безопасности о практической стороне подготовки почему-то вспоминают значительно реже, хотя, как показывают те же инциденты с JBS и Colonial Pipeline, последствия небезопасных действий неподготовленных сотрудников могут быть крайне разрушительными.
Чтобы научить сотрудников правильно распознавать кибератаки и реагировать на них, нужно поместить их в условия, максимально приближённые к реальным. Сделать это своими силами сложно. Для имитации тактик мошенников требуется серьёзная подготовка, как техническая, так и психологическая, методическая и организационная.
Решить проблему с подготовкой имитированных атак можно путём использования специализированных платформ.
Рисунок 1. Редактор имитированной атаки платформы «Антифишинг»
Рисунок 2. Финальная страница с объяснением неправильных действий пользователя во время имитированной атаки
По данным исследования «Антифишинга», формирование навыков с помощью регулярных имитированных атак приводит к тому, что безопасное поведение вырабатывается уже у 49% сотрудников.
ШАГ 3. ПРИВЫЧКА
Если навык можно рассматривать как целенаправленное автоматическое действие в знакомой ситуации, то привычка предполагает, что оно не просто становится автоматическим, а превращается в потребность. Другими словами, пользователь, получивший фишинговое письмо, не только распознаёт его как мошенническое, не только не совершает небезопасных действий, но и ощущает потребность немедленно «отработать» атаку, уведомив ИБ-подразделение.
Для формирования привычки важно, чтобы между желанием и реализацией не было препятствий. В платформе «Антифишинг» эта задача решена с помощью плагина для MS Outlook, с помощью которого пользователь может сообщить об атаке в один клик (рис. 3).
Рисунок 3. Интерфейс плагина «Антифишинга» для MS Outlook
Плагин умеет различать имитированные атаки и не пересылает их на анализ в службу безопасности.
Если же сотрудник выявит реальную атаку, копия письма со всеми заголовками и содержимым будет отправлена на адрес службы безопасности и переместится в папку нежелательной почты в почтовом ящике сотрудника.
Кроме того, сотрудник может дополнительно разметить атаку по психологическим векторам и атрибуции. Положительная обратная связь, предоставляемая плагином, способствует быстрому превращению навыка распознавания атак в привычку.
Благодаря плагину «Антифишинга» ИБ-служба получает максимально актуальный внутренний поток данных об угрозах (Threat Intelligence-фид), который генерируется сотрудниками. Его можно использовать для быстрого реагирования и блокировки активных цифровых атак (рис. 4).
Рисунок 4. Формирование социоинженерного фида Threat Intelligence благодаря коммуникации пользователей и экспертов SOC
По сути, это и есть Humanfire wall в действии:
- Тренированные сотрудники выявляют цифровую атаку.
- Статистика об этих безопасных и корректных действиях сохраняется в «Антифишинге».
- Исходные данные направляются для анализа в корпоративный центр мониторинга и реагирования на инциденты (Security Operations Center, SOC).
- Аналитики проводят расследование и извлекают собственные индикаторы компрометации (IoC).
- SOC блокирует атаки по выявленным IoC на технических средствах защиты до того, как информация об этих IoC станет доступна во внешних фидах.
Таким образом, удобный для пользователей, основанный на привычках процесс выявления атаки и отправки оповещения повышает эффективность работы ИБ-подразделения, создавая тот самый дополнительный уровень защиты.
ПОСТРОЕНИЕ HUMAN FIREWALL: ГЛАВНОЕ
Обучающие курсы, дайджесты, буклеты — важные способы повысить осведомлённость, но они могут дать сотрудникам только знания.
Typically when your managed IT support provider talks to you about your firewall, it has to do with a hardware device, or some software on your computer. A regular firewall is a device or software that blocks certain types of traffic from entering your network. Most internet traffic, which is when a user visits a website, passes through the firewall on a specific port, or assigned number for that traffic. Emails coming in and out of your network travel on a different port, or number. You want to block ports that aren’t in use by a program on your network to lock the doors to your network. You typically will do this through your firewall. It’s basically a security device that helps keep the good traffic flowing, and the keeps the bad traffic out.
Recently a lot of focus has gone into creating a human firewall. A human firewall meaning is the ability to train employees well enough, that they help secure the network. Much like the regular firewall is protecting the network, a team of well trained employees will also protect your business network. The majority of major attacks on corporate networks recently were due to some form of employee negligence. The most recent being the latest Twitter hack that affected many verified accounts. The human firewall is, by far, the weakest link in a companies cyber security solution.
Building a human firewall requires a lot of training, and a lot of practice. It’s so easy to fall for some of these recent scams. If you aren’t vigilant, you could get sucked in easily since the attacks are becoming more and more convincing. There are a few areas you should concentrate on with your employees to build a fantastic human firewall example.
Give your human firewall the tools to prevent data breaches
Data breaches are not only a security issue, but they are also a compliance and privacy concern. A human firewall needs the right processes and tools in place to help fight data breaches. Security policies must be augmented with clear guidance on what to do in the event of a phishing email, accidental data exposure, shared passwords, and so on.
Security Awareness Training can help to explain the tricks of the cybercriminal trade, but other tools such as incident reporting solutions should be made available. An incident reporting tool should be designed to be easy for staff to enter potential security concerns. It must also be able to automatically triage a security incident and send alerts and reports to the right person to escalate an issue. In this way, an incident reporting tool acts to augment your human firewall.
Continue to build and fix your human firewall
The security landscape changes. Cybercriminals create new tactics to trick employees into clicking phishing links or navigating to malicious websites, and so on. Your human firewall needs to be given regular Security Awareness Training to ensure that staff are up to date with developments in the world of scams, security hygiene, and phishing. This fixes gaps in your human firewall that could open over time.
What Is the Nature of the Threat?
It wasn’t so long ago that cybersecurity attacks were in the headlines due to worldwide ransomware attacks. It’s important to note that just because these attacks no longer feature as prominently in the news, that doesn’t mean they aren’t still happening. The world’s attention is understandably gripped by COVID-19, but your business priorities should still keep a focus on security.
In fact, cybercriminals are now exploiting vulnerabilities directly caused by the fact that more people are working remotely. In some cases, rapid cloud migrations and accelerated digital transformation have even left organizations more vulnerable.
What is a human firewall?
A traditional firewall acts as a virtual border to the outside world, monitoring and filtering incoming and outgoing traffic to manage cyber threats and prevent cyber attacks. The firewall, as a security concept, goes back to the 1980s, but the use of these network security solutions continues to the present day. The concept of a proactive system that controls attacks against an organisation is a successful one, but one that is being challenged by human-centred attacks. This ethos of a collective way to proactively fight cyber attacks does not just apply to a virtual solution it is also applicable to a human shield, in other words, a human firewall.
A human firewall is the real-world equivalent of a traditional network firewall. To create this human firewall, human beings, or in other words the staff of an organisation, are given the tools to recognise and thwart cyber threats. The human firewall is built upon the back of ongoing Security Awareness Training giving everyone the tools to stop hackers.
Vulnerable Devices
A dispersed and decentralized workforce presents an easy target for cybercriminals, as remote workers and their devices are further removed from the purview of the company’s IT department. Employees are using their own devices, which haven’t been patched or managed by IT staff, leaving them vulnerable to attacks.
So, security must be taken seriously. Fortunately, there are many steps that can be taken, including the human firewall.
What Is a Human Firewall?
First things first. Let’s establish a quick human firewall definition. The concept is quite simple. It refers to the people at your organization, and their potential to become a one-stop cyber-crime fighting machine. The first line of protection against certain types of cyberattacks, like phishing attacks, your employees are as important as the hardware and software that make up your IT security.
Most organizations have some training in place around how to create a strong password or how to avoid a phishing attack, but a human firewall goes one step further. It involves establishing a group of people within your organization who promote and carry out cybersecurity best practice. They protect your organization and lead by example, bringing along other members of staff with them—further building up the strength of your human firewall.
2FA or MFA
2-Factor or Multi-Factor Authentication has become extremely important in helping to strengthen the human firewall. This gives employees an extra layer of security for when they do fall for an attack. Multi-Factor Authentication requires two things in order to gain access to the employees accounts, something they know and something they have. Something they know is generally their password. Something they have is typically their phone or a one-time passcode device. When accessing their account they need to enter their password and then enter the one-time code displayed on their phone or device or texted to them. While having this in place will prevent most of the malicious attempts to login to the employees account, it is not fool proof. As MFA rises in popularity, attackers are now smart enough to ask for the code as soon as the employee is handing them their credentials so they can use the code that is sent right away to gain access.
Build your firewall using interactive fun
Security Awareness Training offers practical ways to prevent cyber attacks. However, it should be delivered in a way that is engaging, informative, and interactive. Don’t overwhelm your employees with too many dry security idioms. Instead, build fun sessions that are tailored to your organisation’s needs. This way, your human firewall will grow steadily, and the knowledge delivered by a security awareness program will be more likely to stick.
Build your firewall, human brick by human brick
The more people that populate your human firewall, the more chances a cyber attack will be prevented. Everyone loves to feel like they are part of something bigger than themselves – introduce your employees to the notion of the human firewall as part of a wider Security Awareness Training program. Security Awareness Training delivers the knowledge used to spot a cyber attack, such as a phishing email campaign. By being able to recognise a cyber threat or attack in the making, your staff can stop it before it becomes a successful breach. The more staff that you put through Security Awareness Training, the stronger your human firewall becomes.
The 5 principles behind a human firewall
The human firewall is part of a wider ‘culture of security’, so-called as it imbues a security mindset into the entire workforce, placing security thinking centre stage in an organisation. This is important as it makes taking security precautions and being security-aware, second nature. A human firewall helps to turn security into a cultural norm. To build your human firewall, you should follow these five principles:
Reward your human firewall
The employees that make up the human firewall should feel rewarded for doing a good job and making their workplace a safer environment. Rewards can be part of the Security Awareness Training program or as an end-of-training event.
In a perfect world, there would be no such thing as a human firewall; however, over the last 12-months, 84% of companies have experienced phishing and ransomware attacks. Cyber security is affecting every sector across the world and companies must turn to their staff to augment traditional security solutions. In the past, the traditional firewall could stop hackers from the outside from coming in. Now, these hackers manipulate our employees to circumvent traditional firewalls. The way to fight back is to arm our employees with knowledge and training and to work with them to build a resilient and knowledgeable human firewall.
Weakest Link, No Longer
It is sometimes said that weakest line of defence is your employees. It only takes one careless moment for an employee to click on a phishing email. When we are all busy working to meet deadlines, people are more susceptible to this than they might think.
But we believe this is the wrong way to look at it—and the efficacy of the human firewall proves this. With the right strategy, this “weakest link” idea can be turned on its head. Your employees are your greatest asset, and, with the right training and guidance, they can be a strong part of a robust cybersecurity setup.
Business leaders and CIOs are right to make security a priority due to the increased reliance on remote working. But the importance of security in business should never be ignored. Regardless of whether your teams are working from home or back in the office, building a human firewall is a step that can help tighten up your defenses.
Читайте также: