Tuesday, July 21, 2020

Could the IT help desk be the biggest security risk?

As you may not know, helpdesks are often considered one of the easiest ways to network.Since many help desk technicians are not trained to identify social engineering attacks, security experts often refer to help desks as the number one security vulnerability in the business. The user only practices what has been trained and will help solve the user problem. More than you can imagine, help desk service agents are the target of malicious phishing campaigns.

Why do some people who are help desk technicians have easy access to protected data, not accounting or human resources?

Help desk technicians have access to all your data. They can access the computer remotely, to help resolve computer headaches. But have you visited this stage again? What happens if the help desk calls for phishing or business data? Will the technicians be willing to help the person to the letter? Will they let you go through some hoops to prove who you are?

Nearly 20% of employers' phishing help desk workers were unable to protect corporate data when asked to access certain user machines.

Worse still, almost 70% of the support services do not supervise the technicians. That is, it does not track call logs or record authentication changes. Many help desk support services do not have enough information about recent system updates. Furthermore, most helpdesks lack adequate documentation processes and therefore have little infrastructure to effectively assess where the violation occurred.

Today I would like to talk about some basic security measures that your help desk NEEDS should have to prevent your business from getting caught in serious violation.

Log Help Desk Calls - If you are not tracking help desk calls, you will have no idea when the caller is stealing information and how your call to the help desk contributed to the violation. There is no way to re-evaluate. Calls to the help desk should be monitored for security concerns, as well as to provide feedback to the help desk team on how to handle the calls. Note: Social engineers try many tricks (screaming, crying, persuasive) to destroy technicians. Identifying where the equipment is vulnerable is the key to ensuring that the equipment does not crack under pressure, or at least assessing whether the technician is following a documented call processing process.

Use a phone designed for call centers. With professional equipment, a technician can easily record a call and replay customer interaction after the call ends. If a technician has fallen into social engineering, having a proper phone system can help staff troubleshoot security issues before they become uncontrolled breaches.

Communicate the role of the help desk in updates: Effective and continuous communication with the help desk team ensures that you are aware of possible user problems before someone calls you. Best team to identify users and fraud.

Call me back: When a user calls and requires them to change their network credentials, permissions, or to change their own password, call them back on a documented line to make sure the technician really has the right people. It's a good idea to make sure talking to you. Scammers can be smart and can hide your phone number, so setting up caller ID on your system may not be enough.

No comments:

Post a Comment

Why Your Organization Needs Integrated Outsource Help Desk Software

A wide range of IT operations within an organization can address a wide range of activities and processes, such as ticketing, endpoint manag...