Story image

Where to focus your threat protection strategies this year

23 Jan 2018

The threat posed by cybercrime to businesses, governments and consumers alike has never been more apparent. While awareness of cyber threats may be at an all-time high, attacks are still both prevalent and successful.

Cyber attacks have existed almost since the Internet was born. Some might think that by now organisations would have come to a point where they are a step ahead of criminals. Unfortunately, the constantly changing and complex nature of cyber threats makes it extremely difficult for organisations to keep abreast of the issues and prevent the next attack from happening.

Understanding where the threat comes from, and the techniques cyber criminals employ to expand their reach and cause more damage is the first step towards building winning cyber security strategies.

Here we examine the top cyber security trends that will shape-up the cyber threat landscape in 2018:

Panic around data breach notification laws

New regulations will likely create a wave of panic among public and private organisations, as many of them do not have the right solutions and systems in place to identify data breaches, have a clear view of the data compromised, and take mitigation actions.

Ransomware to get sneakier

Since ransomware is so profitable for hackers, we expect this type of vicious attack to become even more sneaky. Next year, we’ll see more and more of ransomware being used to cover other infections.

Most people are now aware of how the ransomware business model works, so it will be easy to add information stealers to it that may go undetected. We’ll also see more of ransomware as blackmail – encrypted files being uploaded to attacks and released publicly if the ransom is not paid. For example, photos for consumers and confidential documents for businesses are increasingly used by hackers to extort money.

It is going to take major action and co-operation between many different law enforcement agencies around the world to event attempt to shut these activities down, or at decrease the number of successful attack to occur.

It’s critical that both businesses and individuals take action to educate themselves on how to protect their computers and networks to mitigate the risks of ransomware attacks. Here’s a helpful prevention guide.

IoT devices and wearables will increase the surface of attack

The risks to personal data sovereignty that IoT devices pose are numerous: remote hijacking, spyware, personal data collection, harvesting malware and ransomware. The abundance of connected home devices and personal assistants gives yet another channel to hackers, with potentially devastating effects.

With consumers and business owners alike often unaware of the security measures and how much of their private data is been consumed through each device, we are likely to see an increase in these sorts of attacks.

With cyber threats to be more prevalent than ever this year, it is critical companies take action to give themselves the best possible protection. The beginning of the New Year is a great time to reassess their current protection levels.  To determine the best approach, a good place to start is seeking advice from reputable security experts and/or vendors who can advise on the best next steps for any business.

Article by Webroot information security analyst Dan Slattery.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.