Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Cybersecurity Awareness month: Security is a shared responsibility

These days, nearly all of us are consumers of applications and APIs.

We interact regularly with websites and/or applications, whether they are financial, retail, insurance, travel, food, or otherwise in nature.

What we may not realise when we go about our daily business, however, is the extent to which attackers and fraudsters are motivated to profit at our expense. Malicious actors are always on the lookout for opportunities to turn our interactions with the applications and APIs we depend on into a profitable transaction. That’s why it is no surprise that one of this years’ key Cybersecurity Awareness month themes is “recognising and combatting cybercrime”.

In many jurisdictions, locales, and regions around the world, businesses bear the brunt of responsibility and liability for security and fraud issues. That being said, we as consumers are not immune to damage and losses. On top of that, any security and/or fraud issue we personally experience can quickly turn our lives upside down and lead to us to spending considerable time and money picking up the pieces.

While we should always expect the businesses we transact with and consume from to secure and safeguard our accounts and our data, we also need to take an active role in that endeavour. Securing and safeguarding our accounts and data is a joint effort for both consumers and businesses.

While businesses have their own set of responsibilities, here are five steps consumers can take to be active partners in safeguarding and securing their own data:

1. Be alert. When businesses have mature security measures in place, customers often become the target of attackers and fraudsters. This is because, as humans, emotions can often cloud our judgment. Attackers and fraudsters appeal to our empathy in order to trick us into providing them access to, and control over our accounts, data, and even our financial assets. These social engineering techniques are so effective that they are one of the primary attack vectors used against businesses. In other words, it is often easier to get in by compromising the customer than by compromising the business itself. Because of this, we as customers need to be extra vigilant against social engineering attacks.

2. Use MFA. One of the ways in which we can be vigilant against social engineering attacks is by enabling multi-factor authentication (MFA). This is where we use our username, password, and another factor, most often provided out-of-band (via a key generator, text message, email, or otherwise). Using MFA means that if attackers and fraudsters are able to steal our usernames and passwords, there will be an added layer of protection that they will need to go through. Of course, MFA does not make our accounts and data impervious to compromise, but it does reduce the risk significantly.

3. Verify out-of-band. When we think we may have encountered social engineering, it is important to verify out-of-band before proceeding. For example, if a friend or family member sends a text, email, or social media chat asking for money, personal information, help accessing an account, or

similar, it is best to verify with that friend or family member directly. Calling to ask them if they sent that message can be an effective way to do so, and there are other methods as well. The important thing to note here is that attackers and fraudsters are very skilled at appearing legitimate, even though their intentions are anything but.

4. Stay up to date. Scams and tricks abound, unfortunately. To be vigilant consumers, we need to read the technology news to stay abreast of the latest developments in the world of cybercrime. Not everyone needs to become an expert of course but, just as we are aware of the different threats we face as consumers in the analogue world, we should also be aware of different threats we face as consumers in cyberspace.

5. Change platform. One topic that doesn’t get enough attention, in my opinion, is the topic of moving to less intensive and less powerful platforms. Most of us need only the functionality provided by a tablet (e.g. streaming media, web browsers, email, etc.). Yet, most of us conduct our most sensitive financial and purchasing transactions via powerful hardware that attackers and fraudsters are salivating over and waiting to control. Many lighter-weight systems (e.g. tablets and the like) are less targeted by attackers and fraudsters, while providing all the functionality that most of us need. As an added bonus, they are often easier to use and configure.

Although most businesses do their best to secure and safeguard our accounts and data, attackers and fraudsters are determined to exploit the human element to find ways around those defences. As consumers we need to be active partners in our own security. Only through this partnership between businesses and consumers can we effectively recognise and combat cybercrime.


About the Author

Josh Goldfarb is Field CISO at F5. F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to optimize and secure every app and API anywhere, including on-premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to f5.com.

more insights