If you looked at this email fast, youâd swear it came from Microsoft. Same logo, layout, tone - everything checks out. Except for one thing: The senderâs domain was rnicrosoft(.)com instead of microsoft(.)com That tiny swap of ârnâ instead of âmâ is whatâs called typosquatting. Attackers register near-identical domains to catch people who skim their inbox too fast. What makes this effective is how subtle it is. On mobile, you barely see the full address. On desktop, your brain autocorrects it. It feels right and thatâs all they need. These kinds of tricks are showing up more often in credential phishing, vendor invoice scams, even internal HR impersonations. How to handle these cleanly (real, practical steps): - Expand the full sender address every time before you click. - Hover the link to view the real href, or long-press the link on mobile to reveal the URL. - Check the Reply-To header -- scammers often route replies elsewhere. - If itâs a password reset you didnât request, open a new tab and log in from the official site rather than clicking the email. - Forward the phish to your security team or report it (company phishing inbox / your providerâs report feature). Examples of look-alikes to watch for: swapped letters (rn â m), zero for o (micros0ft), added hyphens or extra subdomains (microsoft-support[.]com). Small habit change, big payoff. Teams that rehearse these scenarios stop reflexively clicking.
Cybersecurity in Remote Work Environments
Explore top LinkedIn content from expert professionals.
-
-
ð2024 Replay: Modern Approaches to Network Access Security ð CISA, the FBI, New Zealandâs GCSB, CERT-NZ, and the Canadian Centre for Cyber Security collaborated on this guidance to address the limitations of traditional VPNs and emphasize the transition to modern network access solutions. The document highlights architectures like Secure Access Service Edge (SASE) and Secure Service Edge (SSE) that align with Zero Trust principles and meet the demands of todayâs hybrid, cloud-first environments. Key Takeaways: ð VPN Risks: This section highlights the vulnerabilities of traditional VPNs, including real-world exploits like Citrix Bleed, which enabled attackers to bypass MFA and gain unauthorized access. ð Modern Security Solutions: This section explains how Secure Access Service Edge (SASE) and Secure Service Edge (SSE) integrate Zero Trust principles to provide granular, adaptive access control across hybrid and cloud-first environments. ð¡ï¸Â Hardware-Enforced Segmentation: This recommendation uses unidirectional technologies like data diodes to safeguard critical systems, reducing reliance on software-based solutions and enhancing overall security. ð Actionable Guidance: This section includes practical steps, such as implementing Zero Trust Network Access (ZTNA) policies, validating vulnerability scans, and segmenting networks to contain threats better and stop lateral movement. ð This post is part of my year-end review of 2024âs most impactful cybersecurity documents. Critical guidanceâlike this June 2024 releaseâoften gets overlooked or fades after its initial promotion. Revisiting these documents provides an opportunity to refocus on recommendations that are foundational to enhancing security postures. (Full disclosure: I participated in initial discussions about this guidance before transitioning from CISA to #Zscaler earlier this year.) ð¬ Link to the website in comments. #zerotrust #cybersecurity #informationsecurity #cloud #threathunting #cloudcomputing #technology #analytics #innovation
-
ðï¸ Needed report By CyberArk on a burning issue : identity security. A decisive element that will determine our ability to restore digital trust. ð¹Â « Identity is now the primary attack surface. » Defenders must secure every identity â human and machine ð¹ with dynamic privilege controls, automation, and AI-enhanced monitoring ð¹and prepare now for LLM abuse and quantum disruption. Machine identities are the fastest-growing attack surface ð¹Growth outpaces human identities 45:1. ð¹Nearly half of machine identities access sensitive data, yet 2/3of organizations donât treat them as privileged. Quantum readiness is urgent ð¹Quantum computing will break todayâs cryptography (RSA, TLS, identity tokens). ð¹Transition planning to quantum-safe algorithms must start now, even before standards are finalized. Large Language Models include prompt injection, data leakage, and misuse of AI agents. So organizations must treat them as a new class of machine identity requiring monitoring, access controls, and secrets management. ð§° What can we do? âï¸ 1/ Implement Zero Standing Privileges (ZSP) ⢠Remove always-on entitlements; grant access dynamically and just-in-time. ⢠Minimize lateral movement by revoking privileges once tasks are complete ð¥2/ Secure the full spectrum of identities ⢠Differentiate controls for workforce, IT, developers, and machines. ⢠Prioritize machine identities: vault credentials, rotate secrets, and eliminate hard-coded keys. ð¡ï¸ 3/ Embed intelligent privilege controls ⢠Apply session protection, isolation, and monitoring to high-risk access. ⢠Enforce least privilege on endpoints; block or sandbox unknown apps. ⢠Deploy Identity Threat Detection & Response (ITDR) for continuous monitoring. â»ï¸ 4/ Automate identity lifecycle management ⢠Use orchestration to onboard, provision, rotate, and deprovision identities at scale. ⢠Relieve staff from manual tasks, counter skill shortages, and improve compliance readiness. 5/ Align security with business and regulatory drivers ⢠Build an âidentity fabricâ across IAM, PAM, cloud, SaaS, and compliance. ⢠Tie metrics (KPIs, ROI, cyber insurance conditions) to board-level priorities. 6/ Prepare for next-generation threats ⢠Establish AI/LLM security policies: control access, monitor usage, audit logs. ⢠Begin phased adoption of post-quantum cryptography to protect long-lived sensitive data. Enjoy the read
-
Nation-states donât exploit weak security. They exploit workplace dynamics. I know, because this is exactly how I recruited insiders. Espionage doesnât start with secrets. It starts with validation. A compliment at the right moment. A shared frustration. Someone who listens when your company doesnât. Thatâs not spycraft. Thatâs just a Tuesday at work. I never asked for sensitive information up front. I asked what was broken. Who made their job harder than it needed to be. What they would fix if anyone actually listened. They thought they were venting. I was mapping access, influence, and motivation. Thatâs called elicitation. Companies like to believe insider threats come from âbad actors.â They donât. They come from good employees in very human moments: burnout, loyalty conflict, money stress, bruised ego, identity cracks, resentment thatâs been quietly fermenting. And yes, your highest performers were always my favorite targets. They were trusted. They were visible. They had access. And they cared enough to talk. Remote work didnât invent this. It removed friction. You trained people to network. We trained people to recruit. Same skills. Different intent. If your organization still treats espionage as a cyber problem or a personality flaw, youâre already behind. Because the easiest way into your organization was never through the firewall. It was through someone who finally felt understood. #InsiderThreat #HumanRisk #Espionage #TrustIsASystem #Cybersecurity #Leadership #HR *Photo of me back in the day, post deployment*
-
The insider threat isn't malicious. It's Wednesday. Your employee pastes customer data into ChatGPT to write a better follow-up email. Your developer uploads proprietary code to get debugging help. Your exec shares the board deck with an AI summarizer to prep for a meeting. None of them think they're doing anything wrong. They're just trying to get through their day. Yeah.... let's keep spending millions on perimeter defenses hunting sophisticated attackers while our own people walk proprietary data out the front door through tools we encouraged them to adopt. That's worked for us for the past 25 years... Gartner predicts that through 2026, at least 80% of unauthorized AI transactions will stem from internal policy violations, not external attacks. [Source: Gartner Market Guide for AI TRiSM, 2025] 80%. Not malicious hackers. Not nation-states. Your people. On a Wednesday. The threat model most security teams operate under is backwards. We're building moats against adversaries while ignoring the backdoor we installed for productivity. I've seen governance programs that produce beautiful documentation nobody reads. Acceptable use policies clicked past faster than cookie consent banners. Training modules that check compliance boxes while teaching nothing. And many of you are doing that as part of your "2026 Security Program Initiative." None of it matters when convenience is on the other side. Make the secure path the easy path. PII redaction that lets people use AI tools without leaking data. Approved platforms that are genuinely better than consumer alternatives. Controls that enable productivity rather than block it. You're already behind if your AI governance strategy relies on people reading policies and making good decisions under deadline pressure. Don't get me wrong... administrative controls are a start, but you need to get off of that starting block really damn soon. The fix is architecture, not useless "awareness." ð Follow and connect for more AI and cybersecurity insights with the occasional rant #AIGovernance #InsiderThreat #DataLeakPrevention
-
NSA and CISA released five (5!) guidance documents last week on the theme of Cloud Security Best Practices, bundled together for convenience in the attached. What's the TL;DR? ð Use Secure Cloud Identity and Access Management Practices: Implement robust authentication methods, manage access controls effectively, and secure identity federation systems to protect cloud environments from unauthorized access. ð Use Secure Cloud Key Management Practices: Securely manage encryption keys using hardware security modules (HSMs), enforce separation of duties, and establish clear key destruction policies to safeguard sensitive data in the cloud. ð Implement Network Segmentation and Encryption in Cloud Environments: Utilize encryption for data in transit, employ micro-segmentation to isolate network traffic, and configure firewalls to control data flow paths within the cloud. ð Secure Data in the Cloud: Protect data using strong encryption, implement data loss prevention tools, ensure regular backups and redundancy, enforce strict access controls, and continuously monitor data access and activities. ð Mitigate Risks from Managed Service Providers in Cloud Environments: Establish clear contracts outlining security responsibilities, continuously monitor service provider activities, and ensure compliance with security standards to reduce risks associated with managed service providers in cloud environments. Some common themes that run through all of these are the need for encryption, implementing access control (with a special call-out for ABAC being a key element of Zero Trust), key management, and monitoring and logging. Also, for those who celebrate it: Happy Pi Day!
-
>> Enhancing Government Security: Apple Indigo & BlackBerry UEM Partnership  In todayâs fast-paced digital world, the stakes for securing sensitive information are higher than ever, especially within government agencies. Enter Apple Indigo, a robust security solution with certification-ID by Germanyâs Federal Office for Information Security (BSI), designed specifically for Apple iOS devices like iPhones and iPads used in high-security government environments. This solution, coupled with BlackBerry's Unified Endpoint Management (UEM), presents an unprecedented level of security without sacrificing user experience. ð  What makes Apple Indigo & BlackBerry UEM so revolutionary? 1ï¸â£ High Security, Zero Specialized Hardware: Apple Indigo allows organizations to leverage standard Apple devices while meeting strict security demands up to VS-NfD (for official use only). 2ï¸â£ Streamlined Administration: With BlackBerry UEMâs approach, sensitive data is safeguarded on both corporate and personal devices. Its architecture, requiring only outbound firewall ports, simplifies secure installation. 3ï¸â£ Seamless Integration: The Apple ecosystemâincluding Mail, Calendar, and Contacts appsâcan be securely used for official communication, eliminating the need for extra hardware or complex setups. 4ï¸â£ Comprehensive Solutions in One Place: BlackBerryâs expertise in secure mobile solutions, combined with Appleâs devices, offers a one-stop-shop for high-security mobile work requirements. 5ï¸â£ Expanding Use Cases beyond Apple Indigo: Using BlackBerryâs MDM solution for other brighsite deployments, e.g. SecuSUITE for Samsung Knox   ð¡ Why This Matters: In an era where data breaches can impact national security, solutions like Apple Indigo & BlackBerry UEM provide organizations with high security, usability, and ease of management.  ð¢  Ready to learn more? Explore how this innovative solution can empower secure communication in high-stakes environments.  ð Indigo Webpage: https://lmy.de/uFFiw  ð Nehmen Sie an diesem deutschen Webcast teil, um weitere Einzelheiten zu erfahren: https://lmy.de/uqvQB  â Thought-provoking question: How are you preparing your organization for the growing demands of digital security in todayâs unpredictable landscape? #GovernmentSecurity #CyberSecuritySolutions #MobileSecurity #AppleIndigo #BlackBerryUEM
-
Letter H: Hybrid Work: Protecting an Organization with a Hybrid Workforce Our "A to Z of Cybersecurity" tackles Hybrid Work - the new normal with employees working both remotely and on-site. However, a dispersed workforce introduces new security challenges. Let's bridge the security gap and keep your hybrid castle safe: Fortifying Your Defenses: · Secure Remote Access: Implement strong authentication and access controls for remote connections. · Endpoint Security: Deploy robust security software on all devices, regardless of location. · Data Loss Prevention (DLP): Prevent sensitive data from being accidentally or maliciously shared outside the organization. United We Stand: · Collaboration Tools: Use secure collaboration platforms to share information and foster teamwork. · Cloud Security: Choose cloud service providers with robust security measures and educate employees on secure cloud usage. · Zero Trust Architecture: Implement a security model that verifies access for all users, regardless of location or device. Hybrid work offers flexibility, but security remains paramount. By building strong defenses, fostering awareness, and implementing secure collaboration tools, you can create a safe and productive hybrid environment for your organization. #Cybersecurity #HybridWork #A2ZofCybersecurity
-
Your home and office devices can be used in cyberattacks. Hereâs what to do. The US government disrupted a Chinese hacking operation that utilized compromised small office and home office network equipment, including routers, firewalls, and VPN hardware to route their traffic. But employing simple cyber hygiene we will discuss below can keep your home, your business and/or your company safe. How Hackers Invaded: Hackers exploited vulnerabilities in outdated devices, especially those nearing "end-of-life" status and no longer receiving security updates. They then used known weaknesses to gain control and reroute their malicious traffic through these devices, making it harder to detect their real targets. Why They Do It: These compromised devices act as "stepping stones," hiding the hackers' tracks and making it harder to pinpoint their true intentions. It's similar to the 2016 attack on internet provider Dyn, when hackers launched a massive internet outage affecting websites such as Amazon, PayPal, Walgreens, Visa, CNN, Fox News, Wall Street Journal, and the New York Times. At that time, hackers took control of routers, cameras, Printers, and other devices by using the default password coming out of the factory. ð¡ Simple Steps to Secure Your Home and Office: â¡ï¸ Update, Update, Update: Regularly update your router, firewall, VPN, and all connected devices with the latest security patches. Most devices offer automatic updates - enable them! â¡ï¸ Ditch the old tech: If your router or other devices are nearing end-of-life, invest in newer, secure models. â¡ï¸ Password Power: Set strong, unique passwords for all your devices and enable two-factor authentication wherever possible. Hackers love easy prey, make them work for it! â¡ï¸ Firewall Fortitude: Enable your firewall and anti-virus and configure both to detect and block suspicious activity. Think of it as a security guard for your digital life. For Companies: While the above advice works for both individuals and companies, companies should assume they will be hacked and be prepared. The preparation must include at least: â¦ï¸ Off-network backup, â¦ï¸ Incident response action plan â¦ï¸ Disaster recovery plan What are you doing to keep your home equipment and your company secure? #cyberdefence #cybersecurity #levelUpYourLi _______________ â¡ï¸ I am Talila Millman, a fractional CTO, a management advisor, a keynote speaker, and an executive coach. I help CEOs and their C-suite grow profit and scale through optimal Product portfolio and an operating system for Product Management and Engineering excellence. ð My book The TRIUMPH Framework: 7 Steps to Leading Organizational Transformation will be published in Spring 2024. You can preorder a signed copy on my website Image credit: Bing AI powered by DALL-E3