Been Hacked Yet? Strategies to Stay Safe and Protected

XVII International Conference on Systems, Automatic Control and Measurements, SAUM 2024 (pp. 55-58)

АУТОР(И) / AUTHOR(S): Karl Benkič

Download Full Pdf  

DOI:  10.46793/SAUM24.055B

САЖЕТАК / ABSTRACT:

As cyber threats become increasingly frequent and sophisticated, organizations of all sizes are more vulnerable than ever to security breaches. This paper emphasizes the need for accessible cybersecurity strategies that can benefit both small and large enterprises. Smaller companies, often limited by resources, are particularly attractive targets, while larger organizations face unique vulnerabilities stemming from their extensive networks, vendor dependencies, and demanding user bases.

This paper provides a starting point for companies of all sizes by identifying effective, budget-friendly tools such as Wazuh, PingCastle, and Purple Knight, which can significantly enhance security across organizations. Additionally, we propose key monitoring practices for administrators in Windows domains and demonstrate how built-in tools can play a vital role in safeguarding systems. Foundational practices—such as enforcing strong password policies, implementing regular software updates, and utilizing multifactor authentication (MFA)—are also addressed as essential defences against common cyber threats. Employee training is highlighted as a critical component, enabling staff to recognize and mitigate potential threats, particularly given the frequent role human error plays in breaches.

By focusing on accessible tools and straightforward strategies, this paper aims to make cybersecurity achievable for organizations with limited resources. “Been Hacked Yet? Strategies to Stay Safe and Protected” serves as a practical guide for strengthening defences and fostering a resilient security posture amidst today’s evolving cyber threat landscape.

КЉУЧНЕ РЕЧИ / KEYWORDS:

cyber security, hacking, digital resource locking

ЛИТЕРАТУРА / REFERENCES

  1. https://aag-it.com/the-latest-ransomware-statistics/
  2. https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations
  3. https://blog.netwrix.com/2021/04/21/active-directory-auditing/
  4. https://wazuh.com/
  5. https://graylog.org/
  6. https://github.com/21y4d/nmapAutomator
  7. https://github.com/swiftonsecurity
  8. https://github.com/olafhartong