Story image

Where to focus your threat protection strategies this year

23 Jan 2018

The threat posed by cybercrime to businesses, governments and consumers alike has never been more apparent. While awareness of cyber threats may be at an all-time high, attacks are still both prevalent and successful.

Cyber attacks have existed almost since the Internet was born. Some might think that by now organisations would have come to a point where they are a step ahead of criminals. Unfortunately, the constantly changing and complex nature of cyber threats makes it extremely difficult for organisations to keep abreast of the issues and prevent the next attack from happening.

Understanding where the threat comes from, and the techniques cyber criminals employ to expand their reach and cause more damage is the first step towards building winning cyber security strategies.

Here we examine the top cyber security trends that will shape-up the cyber threat landscape in 2018:

Panic around data breach notification laws

New regulations will likely create a wave of panic among public and private organisations, as many of them do not have the right solutions and systems in place to identify data breaches, have a clear view of the data compromised, and take mitigation actions.

Ransomware to get sneakier

Since ransomware is so profitable for hackers, we expect this type of vicious attack to become even more sneaky. Next year, we’ll see more and more of ransomware being used to cover other infections.

Most people are now aware of how the ransomware business model works, so it will be easy to add information stealers to it that may go undetected. We’ll also see more of ransomware as blackmail – encrypted files being uploaded to attacks and released publicly if the ransom is not paid. For example, photos for consumers and confidential documents for businesses are increasingly used by hackers to extort money.

It is going to take major action and co-operation between many different law enforcement agencies around the world to event attempt to shut these activities down, or at decrease the number of successful attack to occur.

It’s critical that both businesses and individuals take action to educate themselves on how to protect their computers and networks to mitigate the risks of ransomware attacks. Here’s a helpful prevention guide.

IoT devices and wearables will increase the surface of attack

The risks to personal data sovereignty that IoT devices pose are numerous: remote hijacking, spyware, personal data collection, harvesting malware and ransomware. The abundance of connected home devices and personal assistants gives yet another channel to hackers, with potentially devastating effects.

With consumers and business owners alike often unaware of the security measures and how much of their private data is been consumed through each device, we are likely to see an increase in these sorts of attacks.

With cyber threats to be more prevalent than ever this year, it is critical companies take action to give themselves the best possible protection. The beginning of the New Year is a great time to reassess their current protection levels.  To determine the best approach, a good place to start is seeking advice from reputable security experts and/or vendors who can advise on the best next steps for any business.

Article by Webroot information security analyst Dan Slattery.

Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Ensign and IronNet partner to create cyber analytics capabilities
The Singapore-based joint venture will form a Cyber Analytics Center for Excellence focused on securing regional enterprises from sophisticated cyber threats.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.