Security company Genetec looks at how to maximise your protection against cyber attack

Security company Genetec looks at how to maximise your protection against cyber attack

  • How can you detect a potential social engineering attack?

Social engineering attacks such as phishing, ransomware, or pretexting are dangerous and often hard to pinpoint. In order to protect your organization against cyber threats, it’s very important to detect them as soon as possible and that every employee in an organisation knows how to do so. 

If you receive requests such as user, shared credentials, contractual, financial or personal information, or unusual or suspicious links, files and calls, you should think twice before engaging with them. 

  • How do you educate users in different devices to protect them?

Every member of your organisation needs to be aware of the best practices around protecting your organisation’s data and educating them on how to secure their devices is an ongoing process. 

Locking your devices before you leave your workstation is an essential starting point since your password acts as the first line of defence.

Another key factor is refraining from using third-party applications that haven’t been approved by your IT department, as it ensures that you’re not using any vulnerable programs that could be exploited. You should also limit any unnecessary use of personal devices for work. Instead, use the devices made available by your organization to help reduce the risk of a cyber-attack.

  • How do you keep up with software and hardware best practices?

Software and hardware physical security best practices help to ensure that you’re doing all you can to secure your organization.

Choosing systems with built-in layers of defence strengthens your organisation’s cybersecurity the minute they’re up and running. 

Software updates should also be prioritized as they play a very important role in helping to secure your organisation. 

  • How do you choose the right technology to be protected from cyber-attacks?

It’s quite difficult to find a technology provider that offers the solutions you need, all while operating with transparency. Although deciding which vendor is the right fit for your organisation might be time-consuming, it’s a crucial step towards shaping your ideal security solution.

Most vendors’ guides provide tips on how to keep your system secure, so ask the right questions to ensure you receive your vendors’ relevant data and privacy protection policies.

Choosing the right technology, as well as, operating with transparency and maintaining clear communication around vulnerabilities are central to create a strong cybersecurity strategy.

  • How are companies in the Middle East protected against cybersecurity?

Cyber-attacks in the Middle East have been increasing drastically. According to a report from CNBC, the UAE witnessed an ‘at least 250% increase’ in cyber-attacks in the year 2020. And according to another report from Security Middle East Magazine, at least 95% of Saudi Arabian organizations suffered a cyber-attack in 2019 – 2020. 

These days, enterprises are growing more vigilant and striving to create a secure cyber environment. But most often these efforts prove to be futile. Moreover, every organization in the region is not yet prepared to combat the rising cyber-crimes.

The only feasible solution is to adopt effective policies for preventing an attack from occurring in the first place.

  • How do you maintain a strong cybersecurity strategy?

Choose solutions that help you automate maintenance and health monitoring to stay on top of possible vulnerabilities.

A security platform developed with cybersecurity in mind can save you time and worry by telling you what’s happening and what needs to be done to comply with best practices. At Genetec, here there are some features that we have developed and shared with our customers:

  • The System Availability Monitor (SAM) works quietly in the background, monitoring the status and health of each individual component within your system. As soon as a camera goes offline, SAM lets you know about it. 
  • The Genetec Update Service (GUS) alerts you to all the new product updates. That way if there are new features or fixes being released, you can automatically download updates in the background and install it on schedule or when time allows.  
  • The new Security Score widget automatically tracks the security of your system in real-time and tells you clearly where you stand. It does this by laying out guidelines and then monitors whether the different elements of your system comply. All the information is available on one page, letting you know exactly what you need to do to improve your score.



SecurMiddleEast Events Series; next events taking place in Riyadh & Doha – CLICK HERE to register your interest