• The Gulf Information Security Expo and Conference (Gisec) kicks off in Dubai. Photos by Chris Whiteoak / The National
    The Gulf Information Security Expo and Conference (Gisec) kicks off in Dubai. Photos by Chris Whiteoak / The National
  • People visit the STM stand at GISEC at the Dubai World Trade Centre.
    People visit the STM stand at GISEC at the Dubai World Trade Centre.
  • In the past year, the UAE has seen a 300 per cent increase in cyberattacks.
    In the past year, the UAE has seen a 300 per cent increase in cyberattacks.
  • The average resident in the Emirates spent seven hours and 24 minutes online per day in 2020. according to data from the World Digital Report 2021.
    The average resident in the Emirates spent seven hours and 24 minutes online per day in 2020. according to data from the World Digital Report 2021.
  • People visit Gisec at the Dubai World Trade Centre on Monday.
    People visit Gisec at the Dubai World Trade Centre on Monday.
  • The Covid-19 outbreak exposed a barrage of cyber security vulnerabilities as hackers took advantage of the uptake in digital adoption.
    The Covid-19 outbreak exposed a barrage of cyber security vulnerabilities as hackers took advantage of the uptake in digital adoption.
  • Experts said while hackers will always find ways to breach systems, international knowledge sharing will help keep abreast of new attacks.
    Experts said while hackers will always find ways to breach systems, international knowledge sharing will help keep abreast of new attacks.
  • Ahmed Saleh, sales engineer at Recorded Future, speaks on the sidelines of Gisec.
    Ahmed Saleh, sales engineer at Recorded Future, speaks on the sidelines of Gisec.

Four simple mistakes that roll out the red carpet for cyber criminals


Kelly Clarke
  • English
  • Arabic

Since the start of the pandemic millions have been working remotely, and many are unknowingly putting their company's data in harm's way.

A lack of firewalls, inadequate technical infrastructure and decentralised IT systems can quickly lead to significant data breaches, identity fraud and a number of other dangers.

Paula Januszkiewicz, founder of cybersecurity agency CQURE said that companies failing to secure remote workers' systems, are “creating a hacker’s paradise”.

Speaking at the Gulf Information Security Expo and Conference (Gisec) in Dubai, she said phishing is the main mode of transportation for ransomware.

Today, online criminals can make an average of "$90,000 per month from ransomware campaigns", making it a lucrative, albeit illegal, career.

Since the Covid-19 outbreak, Ms Januszkiewicz said the US Federal Bureau of Investigation has reported a “300 per cent increase in reported cyber crimes”, as more people connected online for work and pleasure during global lockdowns.

Some of the sure signs you have been hacked include getting a ransomware message, a fake antivirus message or friends receiving social media invitations from you that you didn’t send.

Here, The National has put together a list of the most common threats - plus potential solutions - to avoid getting hacked.

Disabling a firewall

Does your home internet system have a firewall? If not, you could be vulnerable to hackers. Getty Images
Does your home internet system have a firewall? If not, you could be vulnerable to hackers. Getty Images

A firewall monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic depending on the threat level.

With cyber attacks on the rise since the start of last year, proper firewall configuration is more important than ever.

Disabling a firewall can leave a business or individual vulnerable to attacks. It could result in viruses infecting interconnected devices, allowing cyber criminals to carry out malicious activity remotely.

Ms Januszkiewicz said that when working from home, configuring a firewall is a great way to only allow certain processes to communicate with the internet.

Overly simple passwords and security questions

This is one of the most common mistakes made by people trying to secure their online accounts, and it ultimately makes them more prone to cyber attacks.

Devising and remembering complex passwords for every account and website is almost impossible for an individual, so many re-use the same password for several accounts.

To add to this, they often make them simple so they can be remembered with ease, which is a recipe for data breaches, account takeovers and other forms of attack.

While trying to improve the cybersecurity status for a large company in the US, Ms Januszkiewicz said 29 of the employees had the same password, which consisted of the company name and the year it was founded.

She said passwords were “almost always re-used” and there was almost always “some variant of the company name with a number, whether it be a year or month”.

Regularly changing your password is a must when trying to keep ahead of cyber criminals, and where possible, make it complicated and different from other accounts you hold.

Check home wi-fi

Many companies are failing to secure remote worker's IT systems, creating a "hacker's paradise". Getty
Many companies are failing to secure remote worker's IT systems, creating a "hacker's paradise". Getty

While companies often secure their remote workers' laptops, they frequently overlook how home wi-fi networks may pose a risk to company data security.

For instance, while many people know to update their smartphone or antivirus software, updates to home router software are often missed. Similarly, many people do not have a firewall to guard their home network.

While working remotely you should periodically update your router's software when updates are available. This ensures that any existing security gaps are quickly patched before a hacker can plan an attack.

Additionally, check to see if your router has any encryption features that can be enabled.

No network segmentation

Network segmentation is one way in which employees can protect their systems while working from home.

The practice involves splitting a computer network into subnetworks to boost performance and improve security.

Having network segmentation in place allows greater control over who has access to what in a company, and allows rules to be set to limit traffic.

If one sub-network is breached when working from home, you can alert your IT department and they can be proactive in protecting other sub-networks from attack.

Checking your employer has implemented good network segmentation is one way to prevent hackers from doing too much damage.

Tactics to use when dealing with cyber blackmailers

Matthias Schranner, founder and chief executive of Schranner Negotiation Institute. Gisec
Matthias Schranner, founder and chief executive of Schranner Negotiation Institute. Gisec

1. Start immediately – Once you realise your data or system has been breached, you must start negotiating immediately.

The more time you take to respond to a demand, the more agitated they will get

2. Inform the authorities – as soon as you are aware of the breach, you need to secure a lead negotiator who is not attached to the organisation

3. Have an end goal – always remember that the target of a negotiation is to reach a solution

4. Be respectful – if you negotiate with cyber criminals, you must never tell them that what they are doing is wrong, despite the fact that it is illegal. This could potentially sever ties with the attacker and ruin the negotiation outcome.

It is important in this situation that you establish a relationship with the person on the other end of the phone or email.

5. Proof of life – the riskiest element of negotiation is liaising with the wrong person.

Ask them to show you that they can restore a system, but be respectful. To do this, ask your internal technology experts to send them homework.

If they prove they have legitimate access to restore the system, you can continue your negotiation

Tips by Matthias Schranner, founder and chief executive of Schranner Negotiation Institute

The Perfect Couple

Starring: Nicole Kidman, Liev Schreiber, Jack Reynor

Creator: Jenna Lamia

Rating: 3/5

Tamkeen's offering
  • Option 1: 70% in year 1, 50% in year 2, 30% in year 3
  • Option 2: 50% across three years
  • Option 3: 30% across five years 
Avatar: Fire and Ash

Director: James Cameron

Starring: Sam Worthington, Sigourney Weaver, Zoe Saldana

Rating: 4.5/5

Important questions to consider

1. Where on the plane does my pet travel?

There are different types of travel available for pets:

  • Manifest cargo
  • Excess luggage in the hold
  • Excess luggage in the cabin

Each option is safe. The feasibility of each option is based on the size and breed of your pet, the airline they are traveling on and country they are travelling to.

 

2. What is the difference between my pet traveling as manifest cargo or as excess luggage?

If traveling as manifest cargo, your pet is traveling in the front hold of the plane and can travel with or without you being on the same plane. The cost of your pets travel is based on volumetric weight, in other words, the size of their travel crate.

If traveling as excess luggage, your pet will be in the rear hold of the plane and must be traveling under the ticket of a human passenger. The cost of your pets travel is based on the actual (combined) weight of your pet in their crate.

 

3. What happens when my pet arrives in the country they are traveling to?

As soon as the flight arrives, your pet will be taken from the plane straight to the airport terminal.

If your pet is traveling as excess luggage, they will taken to the oversized luggage area in the arrival hall. Once you clear passport control, you will be able to collect them at the same time as your normal luggage. As you exit the airport via the ‘something to declare’ customs channel you will be asked to present your pets travel paperwork to the customs official and / or the vet on duty. 

If your pet is traveling as manifest cargo, they will be taken to the Animal Reception Centre. There, their documentation will be reviewed by the staff of the ARC to ensure all is in order. At the same time, relevant customs formalities will be completed by staff based at the arriving airport. 

 

4. How long does the travel paperwork and other travel preparations take?

This depends entirely on the location that your pet is traveling to. Your pet relocation compnay will provide you with an accurate timeline of how long the relevant preparations will take and at what point in the process the various steps must be taken.

In some cases they can get your pet ‘travel ready’ in a few days. In others it can be up to six months or more.

 

5. What vaccinations does my pet need to travel?

Regardless of where your pet is traveling, they will need certain vaccinations. The exact vaccinations they need are entirely dependent on the location they are traveling to. The one vaccination that is mandatory for every country your pet may travel to is a rabies vaccination.

Other vaccinations may also be necessary. These will be advised to you as relevant. In every situation, it is essential to keep your vaccinations current and to not miss a due date, even by one day. To do so could severely hinder your pets travel plans.

Source: Pawsome Pets UAE

'Worse than a prison sentence'

Marie Byrne, a counsellor who volunteers at the UAE government's mental health crisis helpline, said the ordeal the crew had been through would take time to overcome.

“It was worse than a prison sentence, where at least someone can deal with a set amount of time incarcerated," she said.

“They were living in perpetual mystery as to how their futures would pan out, and what that would be.

“Because of coronavirus, the world is very different now to the one they left, that will also have an impact.

“It will not fully register until they are on dry land. Some have not seen their young children grow up while others will have to rebuild relationships.

“It will be a challenge mentally, and to find other work to support their families as they have been out of circulation for so long. Hopefully they will get the care they need when they get home.”

ATP WORLD No 1

2004 Roger Federer

2005 Roger Federer

2006 Roger Federer

2007 Roger Federer

2008 Rafael Nadal

2009 Roger Federer

2010 Rafael Nadal

2011 Novak Djokovic

2012 Novak Djokovic

2013 Rafael Nadal

2014 Novak Djokovic

2015 Novak Djokovic

2016 Andy Murray

2017 Rafael Nadal

2018 Novak Djokovic

2019 Rafael Nadal