{"id":197,"date":"2023-08-08T12:49:13","date_gmt":"2023-08-08T12:49:13","guid":{"rendered":"https:\/\/cxo.exrtechsolutions.com\/?p=197"},"modified":"2023-08-10T10:42:06","modified_gmt":"2023-08-10T10:42:06","slug":"cyber-awareness-required-for-identity-security-threats-in-2023","status":"publish","type":"post","link":"https:\/\/cxo.exrtechsolutions.com\/index.php\/2023\/08\/08\/cyber-awareness-required-for-identity-security-threats-in-2023\/","title":{"rendered":"Cyber Awareness Required for Identity Security Threats in 2023"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"197\" class=\"elementor elementor-197\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b846e8d elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2b846e8d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-36381363\" data-id=\"36381363\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17dc5dcf elementor-widget elementor-widget-heading\" data-id=\"17dc5dcf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">CXO<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ed2b131 elementor-widget elementor-widget-text-editor\" data-id=\"4ed2b131\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>UPDATES<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-20cb2a5f\" data-id=\"20cb2a5f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-34b098c\" data-id=\"34b098c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b9c83d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2b9c83d3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ffb4871\" data-id=\"5ffb4871\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dcbad38 elementor-widget elementor-widget-heading\" data-id=\"dcbad38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Awareness Required for Identity Security Threats in 2023<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79b9d5b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"79b9d5b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6746d068\" data-id=\"6746d068\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dde0e4a elementor-widget elementor-widget-text-editor\" data-id=\"dde0e4a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With you, the internet will become safer. Attacks, including identity theft, phishing, and cyberbullying, are becoming more sophisticated and severe. According to Microsoft&#8217;s Global Online Safety Survey 2023, 74% of respondents in India stated that they have encountered an online safety concern in the previous year. In order to make the internet a better place for everyone, it is critical to raise awareness of safe and responsible technology use as we observe Safer Internet Day on February 7. In 2023, the following four identity security risks should concern both companies and individuals: <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-54a9703f\" data-id=\"54a9703f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-583b93c2 elementor-widget elementor-widget-image\" data-id=\"583b93c2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/common-1024x576.png\" class=\"attachment-large size-large wp-image-200\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/common-1024x576.png 1024w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/common-300x169.png 300w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/common-768x432.png 768w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/common-1536x864.png 1536w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/common.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74907b7a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"74907b7a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-749f449b\" data-id=\"749f449b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bd9255 elementor-widget elementor-widget-text-editor\" data-id=\"7bd9255\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ol><li><b> Password-based attacks<\/b><span style=\"font-weight: 400;\"> &#8211; Hackers are getting better at breaking passwords, and password security is deteriorating. This is why multi-factor authentication (MFA), which adds an additional layer of protection, should be considered by both businesses and individuals that use passwords.\u00a0<\/span><\/li><\/ol><p>\u00a0<\/p><ol start=\"2\"><li><b> Attacks on multi-factor authentication<\/b><span style=\"font-weight: 400;\"> &#8211;\u00a0 Although it provides an additional degree of security for your accounts, multi-factor authentication (MFA) is not perfect. It&#8217;s crucial to keep up with the latest MFA techniques, such as using a code delivered to your phone or a fingerprint scan, as hackers are constantly coming up with new ways to get around MFA systems. Think of it as though a guard were posted outside the safe. Even though the guard makes it more difficult for the robber to grab your wallet, he or she could still be duped.<\/span><\/li><\/ol><p>\u00a0<\/p><ol start=\"3\"><li><b> Attacks after Authentication<\/b><span style=\"font-weight: 400;\"> &#8211; Post-authentication attacks can still compromise your identity even if you use MFA and strong passwords. These assaults take place after you have entered into an account and may involve a hacker stealing your data by taking advantage of a flaw in a website or application. Zero Trust concepts, such as operating efficient endpoint protection, controlling devices, and, crucially, employing least privileged access (meaning, run as a user, not an admin on your workstations), are excellent defences against post-authentication assaults.<\/span><\/li><\/ol><p>\u00a0<\/p><ol start=\"4\"><li><b> Attacks on Infrastructure<\/b><span style=\"font-weight: 400;\"> &#8211;\u00a0 Finally, it&#8217;s critical to be aware of infrastructure assaults since they have the potential to jeopardise the security of your digital identity. On-premises network vulnerabilities that are out-of-date, unpatched, or otherwise insecure are exploited by attackers to steal information and undermine the infrastructure we depend on. Regularly updating your security software, reducing reliance on on-premises infrastructure, and moving authority to the cloud whenever practical are all critical defences against infrastructure threats. You can contribute to ensuring the security of your personal and financial information by being educated and taking the appropriate precautions to secure it online.<\/span><\/li><\/ol><p><br \/><br \/><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5cd91a1b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5cd91a1b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1418603e\" data-id=\"1418603e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CXO UPDATES Cyber Awareness Required for Identity Security Threats in 2023 With you, the internet will become safer. Attacks, including identity theft, phishing, and cyberbullying, are becoming more sophisticated and severe. According to Microsoft&#8217;s Global Online Safety Survey 2023, 74% of respondents in India stated that they have encountered an online safety concern in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":403,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_canvas","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/197"}],"collection":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":8,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":532,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/197\/revisions\/532"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media\/403"}],"wp:attachment":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}