Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky reminds enterprises that company’s trash may be cybercriminal’s goldmine

According to Kaspersky, the top three carelessly discarded trash that are highly useful for cybercriminals are: work documents, envelopes and digital storage media and whatever info they might extract from these can be monetized or used against your company. 

For cybercriminals, data is still king. So, when targeting a company for an attack, cybercriminals would also turn to the crudest approach— that is, diving into corporate trash for any valuable data. According to Kaspersky, the top three carelessly discarded trash that are highly useful for cybercriminals are: work documents, envelopes and digital storage media and whatever info they might extract from these can be monetized or used against your company. 

“It’s said that one can learn a lot about a person or a company from the trash they throw away. Cybercriminals know that all too well and finding out that they rummage through company garbage shouldn’t be surprising,” says Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky. 

Even with digitizing, companies would still be handling paper. In a research by a printer company, the average office worker prints as many as 6,000 sheets of paper in a year (25 in a day) and about 3,720 sheets are considered waste (10 per day). Another research says that nearly half of printed documents in a typical office are discarded within 24 hours. 

Tossed-out work documents don’t need to have confidential data in it to reveal what your team is doing, your business lingo, or even your current business processes. Once these are in the hands of a cybercriminal, such information would be handy to impersonate a staff, supplier or client through telephone or email to draw out more information. 

Advertisement. Scroll to continue reading.

In the past few years, cybercriminals have increasingly resorted to business email compromise (BEC) attacks that target corporate correspondence. A real-life example was when a car manufacturer’s European division lost more than $37 million (P1.8 billion in today’s current forex) to cybercriminals as a result of a fake bank transfer instruction that an employee mistook as legitimate. 

Another interesting trash for cybercriminals are envelopes from business letters that indicate details of the addressee and the sender. With knowledge of this information, a cybercriminal can contact the recipient with a convincing request for clarification or send a malicious link that appears to confirm receipt of a real physical document. 

Not to be ignored as ordinary office trash are digital media which can be a treasure trove of information for anyone with a malicious intent. A broken smartphone can cough up lists of contacts and messages and can be used to imitate the former user of the device. Flash drives, hard disk drives or solid state drives hold tons of work documents and personal data. 

“More than 80% of all cyber-incidents are caused by human error. Cost-wise, a cybersecurity breach would set back a small to medium-sized business about $101,000 and an enterprise for $1,090,000 on average (as of last year’s statistics from Kaspersky). So, it’s up to us in the business sector, regardless of position in the company, to be mindful that the security of the business depends directly on our behavior in handling corporate data,” adds Yeo.

Below are some tips from Kaspersky on how to minimize or eliminate the use of office supplies for data storage and hopefully not be used by an attacker:

Advertisement. Scroll to continue reading.
  1. First, destroy all paper documents that are related to the work of the company before tossing them in the garbage. That means all of them, not just those containing personal data. Shred them, envelopes included. 
  2. Digital media (hard drives, flash sticks) do not belong in the trash. You have to render them mechanically unusable and take them to an electronics recycling center. Use pliers to snap disks and flash drives. For hard drives, use an electric drill or hammer. Remember that there is a flash drive inside every phone and a hard drive inside every computer. If you’re throwing any of them out, first make sure their data is unreadable. 
  3. Before throwing away parcels or food delivery bags, it’s good practice to tear off and destroy any labels with the name and address of the sender and recipient.

Besides proper disposal of corporate garbage, another way businesses can beef up their cybersecurity is by utilizing technologies like Kaspersky Endpoint Detection and Response Optimum (KEDRO) which delivers straightforward in-depth defense against complex and advanced threats with no additional overheads.

The KEDRO automation features ensure that incidents are dealt with swiftly and its simplified root cause analysis helps reveal the true scope of the threat so you can act accordingly, all with an easy-to-use toolkit.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

Advertisement