Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016

CHRISTOS DIMITRIADIS | 185 views

The dynamic world of cybersecurity continued its rapid pace of change in 2015, creating new challenges and opportunities for ISACA and our 140,000 global constituents. Of course, 2016 will be no different. ISACA professionals across the globe expect to see an evolving mix of cyberthreats, regulatory issues, and an ongoing shortage of qualified cybersecurity workers needed to address these issues, according to the January 2016 Cybersecurity Snapshot survey.Nearly 3,000 IT professionals from 121 countries voiced their opinions in the Cybersecurity Snapshot, and the results say much about where cybersecurity is headed in 2016. Respondents said their top cyberthreat concerns for 2016 were social engineering, insider threats and advanced persistent threats (APTs). Fully 84 percent believe there is a medium to high likelihood of a cybersecurity attack disrupting critical infrastructure (e.g., electrical grid, water supply systems) this year. Nearly a third said there will be some increased risk of insider threats (privileged users) vs. last year.ISACA’s well-trained, knowledgeable professionals do not lack for recommendations on how to best tackle these cyberthreats. Adding two-factor authentication was considered the best response for improving security in the virtualized data center, followed by adding dual-person approvals for certain actions. Other suggested solutions included using a password manager for checking in/out password access to systems, and adding air gaps for different types of workloads (e.g., sensitive or non-sensitive).

Spotlight

CyVantage LLC

CyVantage is a cyber training and facilities design company - currently developing training facilities with academic institutions and commercial experts to improve and maintain the operational readiness of tactical response capabilities for a wide spectrum of enterprises. Rooted in Department of Defense methodologies for developing world-class Cyber Aggressors and Defenders, CyVantage focuses on preparing defenders to operate in real-time, complex, and highly stressful environments. The facilities are state-of-the-art and capable of supporting a variety of multifaceted problem sets, from denials of service to state-sponsored Advanced Persistent Threats. CyVantage leverages expertise and best-practices from industry, the military, and homeland security. The resulting cyber advantage comes from having defenders equally skilled in attack and defense.

OTHER ARTICLES
ENTERPRISE SECURITY

Security-as-a-Service (SECaaS): A Cost-Effective Way of Cybersecurity

Article | August 2, 2022

Cybersecurity threats are growing by the day. Many businesses are unintentionally exposed to hackers and should investigate the possibilities of Security as a Service (SECaaS). While investing in a firewall, anti-virus software, physical office security, an intruder alarm, and CCTV could be insufficient. Unfortunately, in today's ever-changing digital world, this is not enough to keep today's cyber criminals at bay. Malware, ransomware, phishing, viruses, denial of service, distributed denial of service, man-in-the-middle, and brute force attacks are all examples of cybercrime. These are just a few of the methods cybercriminals utilize to attempt to undermine your network security. One of the simplest solutions to securing your system and network is to use security as a service, or SECaas. Why Should Businesses Deploy SECaaS? Depending on your company's demands, your SECaaS provider can build a customized security solution that protects your data, keeps your internal systems safe, and provides you with peace of mind at an affordable price. Cost Saving One of the most significant advantages of a Security-as-a-Service model is that it saves a company money. A cloud-delivered service is often provided in subscription levels with many upgrade possibilities, allowing businesses to pay for just what they need when they want it. It also eliminates the requirement for specialist skills. Updated Security Tools When you use SECaaS, you get access to the most up-to-date security technologies and resources. To be successful, anti-virus and other security solutions must be kept up-to-date with the most recent updates and virus definitions. These upgrades are handled for you on every server, PC, and mobile device by implementing SECaaS across your business. Greater Agility and Better Provisioning One of the most appealing aspects of as-a-service solutions is that your consumers can have rapid access to these products. SECaaS solutions can be scaled up or down as needed, and they are available on-demand where and when you need them. That means no more uncertainties about deployment or upgrades since everything is handled for you by your SECaaS supplier and accessible through a web-enabled dashboard. Make Resources Available When security provisions are maintained outside, your IT employees can concentrate on what matters most to your firm. SECaaS frees up resources, provides comprehensive visibility through management dashboards, and offers you the assurance that your IT security is being handled effectively by an outsourced security team. If you choose, you can delegate management of security procedures to your IT staff, who will handle all policy and system updates through a web interface. Consistent Security As new technology emerges, the provider's databases and protection software will be constantly updated and enhanced. Moreover, it will help in continually monitoring the network for threats using our innovative AI technology to offer round-the-clock security. A fully human-powered team cannot detect every danger, but AI augments human capabilities to give better protection. What Can SECaaS Safeguard Against? It's essential to know what Security-as-a-Service can defend against but also WHERE it will protect you. Your data is now everywhere; on laptops, mobile phones, tablets, local servers, edge servers, cloud services, and each platform has to be protected. SECaaS protects local network devices, edge services, cloud services, WiFi, mobile phones, and tablets. Some of the viruses from which SECaaS protects you are: Malware Ransomware Phishing Virus Denial of service (DoS) Distributed denial-of-service (DDoS) Man-in-the-middle Brute force attacks Closing Lines SECaaS has become the preferred company security approach due to its advantages. SECaaS decreases hardware costs, outsources and streamlines security administration, and eliminates the need for costly security professionals. Since many businesses are embracing cloud technology but are unsure about security, they require their service providers to handle it. SECaaS providers can solve cloud security challenges, including data breaches, DDoS assaults, and phishing.

Read More
PLATFORM SECURITY

Secure your organization’s critical data and increase your bottom line through Vertex’s Managed Security Operations Centre (SOC) Services

Article | June 28, 2022

Over the last two years, cybersecurity has seen a tectonic upheaval as digital transformation efforts have been accelerated, the workforce has become more diverse, and threats have continued to evolve. Security teams are under looming pressure to neutralize more threats with the same number of resources as firms across industries face new cybersecurity concerns. Many security teams are stretched too thin to identify genuine threats quickly due to the never-ending deluge of warnings and vast volumes of log data to comb through daily. As a result, businesses must make updating their Security Operations Centers (SOC) a top priority. Modernizing the SOC plan involves directing resources into boosting security maturity and cybersecurity, with the goal of lowering the organization’s total risk. The best plan must be scalable enough to handle the changing and broad spectrum of security risks while also being adapted to the company’s specific requirements. As a consequence, threat detection and response across the whole environment has improved, as has visibility and team silos. Although each company’s route to SOC transformation is unique, there are a few critical aspects that all businesses should keep in mind when getting started. Let us look at a few of those in detail. Aligning Security Measures with Business Objectives. Beginning the process by aligning security priorities with corporate objectives. This stage is critical because it stops businesses from simply relying on technology. Budget, industry-specific rules and reporting requirements, and the company’s general risk tolerance are all factors to consider while developing these objectives. Considering this isn’t a one-and-done procedure, the Chief Information Security Officer (CISO) must maintain direct contact with the CEO and other top management officials to guarantee ongoing alignment. CISOs must be realistic about the biggest possible dangers to the firm when engaging with leadership about what is needed for SOC modernization and why, without resorting to negative tactics like spreading fear of threats. Team Vertex can help you align your corporate objectives with necessary security measures required to setup an SOC so your firm is prepared in the event of a cyber threat. Establishing a Security Readiness Standard Following the establishment of essential business goals with executive participation, the next stage in improving the overall security measure is to examine the SOC’s strengths and weaknesses. Security operations should be viewed as a crucial business function by companies. The operational efficacy of the SOC must be measured, just like any other critical business component, by examining which key performance indicators (KPIs) and service-level agreements (SLAs) are being satisfied. This standard offers a clear image of the most critical use cases as well as any gaps in the cybersecurity strategy that need to be addressed. It might be difficult to figure out how to make this list at first. However, security teams will have a clearer view of where opportunities to develop their operations exist if they measure against metrics like mean time to detect (MTTD) and mean time to respond (MTTR) to cyber-attacks. Team Vertex’s proficient team of analysts can help you analyze and identify the potential gaps in the system and examine the above-mentioned KPIs and SLAs. Incorporating a Cybersecurity Framework Now it is time to map an operating framework to connect your strategy with particular tactics, techniques, and procedures after you have clearly determined the most important gaps and set timescales and personnel needs. By employing these constantly developing libraries of threat actor tactics, security teams may pinpoint the business’s largest possible threats and assess their protection priorities carefully. Another paradigm to consider is zero trust. Rather than focusing on the corporate perimeter, it stresses an identity-centric paradigm that focuses on safeguarding resources (such as data, identities, and services) regardless of where they are located. Strengthen your defense by beefing up your SOC. The SOC is at the heart of a company’s offensive and defensive strategies against possible attackers. Organizations that do not have the capability to allocate a function or form an in-house team to handle SOC must resort to third party outsourced solutions. Vertex can be that third-party SOC solutions provider by providing an outsourced security operations center, or managed SOC. This permits your security logs to be aggregated into a separate location where our experienced team can examine them and identify the activities necessary to maintain your organization’s security infrastructure and remediate any incidents. Penetration testing, gap analysis, and better compliance are also available. Although no single solution can cure all your security issues, having all of the necessary components in place will help your firm weather the next digital storm, regardless of its source.

Read More
PLATFORM SECURITY

5G: New Possibilities, New Threats

Article | July 12, 2022

5G is the next generation of mobile networks, and its introduction marks the beginning of a new era in the world of networking and cybersecurity. The fifth generation of mobile networks is not only faster than all the previous ‘Gs’ that were launched but also offers new and exciting opportunities for businesses. It is expected to be a game-changer for the business world because of its capabilities to expand business offerings and connect to the IoT. Let's delve into the insights about the new possibilities 5G technology brings for businesses. New Technology: Possibilities 5G Technology Brings In for Businesses Among the most significant benefits of 5G technology is the potential for employees to achieve more in less time, which increases revenue and reduces costs. The tremendous jump in connectivity provided by 5G will generate considerable opportunity for a wide range of industries from healthcare to retail to fintech. According to a study by IHS Markit, the global economy will be worth $13.2 trillion by 2035. This will create 22.3 million jobs in the 5G global value chain alone. Increased IoT Capabilities IoT devices are notoriously vulnerable due to their ease of use and connection. In 2020, Forescout Research found 33 IoT vulnerabilities affecting four open-source TCP/IP stacks (FNET, uIP, Nut/Net, and PicoTCP). According to Forescount, these stacks power millions of devices worldwide. The enormous development of IoT systems has been fueled by consumer devices, business network appliances, and industrial IoT (IIoT) devices. 5G will improve various IoT functionalities and provide critical upgrades to entire networks without pausing functionality, freezing operations or overloading servers. Bridging the Skills Gap Because of advancements in video and remote technologies, 5G will also tremendously benefit small businesses by enhancing hiring processes and assisting business owners in hiring suitable talent to contribute to their business development and help their businesses grow. 5G breaks down barriers to hiring by letting companies find, interview, narrow down, and hire the best people worldwide. Cost Savings 5G is expected to enhance the battery life of devices such as laptops by up to ten times. As a result, companies will see cost savings by lowering the quantity of hardware and IT infrastructure required. This represents a move away from a hardware-driven economy and into an economy that is majorly anchored on software and systems. Savings on decreased administration and other operations can permeate the organization and eventually contribute to the bottom line. New Threats: 5G Cybersecurity Risks Like every technology born, even 5G networks face various threats. Some are passed down from previous generations and legacy standards, while others are new threats associated with the software-defined networking technology owing to 5G. Below are some of the 5G security issues that businesses can tackle with the help of additional cybersecurity measures. Inherited & Emerging Vulnerabilities Compared to earlier generations of wireless networks, 5G is designed to be more secure. For backward compatibility, 5G must still be able to communicate with older standards. In the absence of a security-minded approach, this compatibility requirement assures that the flaws discovered in the outdated SS7 and Diameter protocols utilized by 2G and 4G networks can still haunt a new 5G-based network architecture. Growing Supply Chain Concerns As a result of government intervention in the development of telecom equipment, 5G security risks have been politicized. The use of 5G infrastructure equipment sold by Chinese vendors like ZTE and Huawei is banned in various countries, including the United Kingdom, India, and the United States. These regulations were put in place because of fears that Chinese governmental control over these 5G equipment vendors could undermine the design and data security of 5G equipment offered by these companies. Decentralized security In 5G networks, traditional security checkpoints like hub-and-spoke hardware-based routers have been replaced by cloud of software-defined digital routers that can't be looked at or managed. With more routing points and devices, as well as quicker speeds that favor smash-and-grab attackers, security teams must depend on automated monitoring and create innovative methods to address the rising security vulnerabilities. More IoT Devices Not all manufacturers are emphasizing cybersecurity, as seen with many low-end smart devices. 5G means more effectiveness and possibilities for the Internet of Things (IoT). As the number of connected devices grows, so does the number of prospective areas of attack. Devices such as a fish tank thermometer and a smart TV are examples of devices that might weaken the network. Network breaches and hacking could become more frequent because of the absence of security standards for IoT devices. Overcoming 5G Security Challenges Even if the new 5G technology doesn't fundamentally impact the measures that businesses must take to secure their assets, it does reduce the margin for error and raise the stakes in the event of a failure. Many strategies for dealing with existing network security issues apply equally well to 5G security threats. Strengthen Existing Cybersecurity Measures As we know, most security threats to 5G technology originate from previous generations. Businesses should continue to use existing security techniques to combat such attacks. Businesses must strengthen their existing security equipment to make those strategies more effective. Also, it is essential to educate users in order to minimize human errors that can compromise data and network security. Regular Infrastructure Audit When it comes to data exfiltration, a bad actor's dream is a company's blind spots. You'll need to audit your company's personnel infrastructure. You should also keep an eye on 4G-related vulnerabilities that could continue to harm older devices and networks. Deploy AI & ML for Protection Security providers are embedding AI and machine learning (ML) into their products and services to combat more complex cyberattacks. Experts believe that AI and machine learning systems can grow with the threat matrix, learning to detect and eliminate threats before they breach critical systems and put lives and sensitive data at risk. This will greatly help secure the network and safeguard the data stored in the cloud. IoT Management Solutions As 5G devices become available on mobile device management software, it is essential to control them to ensure device security. To secure the devices that will use 5G technology, you must look for a device management system that can evolve with the demands of your business. Look for a system that focuses on IoT management particularly. Tech Manufacturers Should Develop Secured Products 5G will double the number of connected devices while increasing speed and bandwidth. Unfortunately, many IoT devices are fundamentally insecure, making them obvious targets for hackers. Each insecure IoT device on a company's network offers an additional possible attack route. To prevent IoT devices from being vulnerable targets for cybercriminals, manufacturers must make them more secure. Also, the IoT Cybersecurity Act, which applies to government contractors, was passed by the US Congress. However, regulation of industry suppliers is still not good enough. Key Elements for 5G Cybersecurity for Businesses Conclusion 5G technology will be embraced despite all the challenges since it promises to provide businesses with a powerful new tool capable of driving faster, broader IoT deployments and a competitive advantage in the market. One harsh reality of the digital age is that risks will always exist. In line with the birth of every new technology, new threats are also born, and in the same manner, even solutions emerge. Businesses can overcome all challenges and eliminate all 5G security threats by implementing proper measures. 5G, IoT, AI, and ML are all part of the global tech revolution; leverage these technologies today to position yourself as a leader of tomorrow. FAQ What is the frequency of 5G? Verizon's millimeter wavelength (mmWave)-based 5G Ultra Wideband runs at frequencies between 28 and 39GHz. This is far higher than the frequency used by 4G networks, which ranges between 700 and 2500 MHz. What are the fundamental technologies that makeup 5G? OFDM (Orthogonal frequency-division multiplexing) is a way of modulating a digital signal over several channels to decrease interference. 5G employs the 5G NR air interface in conjunction with OFDM principles. 5G also makes use of higher bandwidth technologies like sub-6 GHz and mmWave. Why does a businessperson need 5G training? Faster connections mean more efficient business operations for your organization. Employees can anticipate that 5G will improve internal and external communications, allowing for better flexibility and time efficiency. Employees should also expect less restriction on where they can work, open doors during office hours, the ability to work from home, and a much better balance between work and life.

Read More
SOFTWARE SECURITY

Machine Learning-Powered Cybersecurity: A Guardian of the Future

Article | May 18, 2022

Today, as more and more businesses are undergoing digital transformation, the risk of cybersecurity is also rising. Cyber risk has evolved as one of the significant threats for businesses over time. Businesses are struggling to safeguard themselves from a growing number of cyber threats. Because of cybercrime, businesses lost approximately $1,797,945 per minute in 2021, according to Tessian. Machine learning (ML) and artificial intelligence (AI) tools offer huge potential to help businesses and other entities deal with a wide range of current cybersecurity challenges. AI and ML enable real-time learning and analysis of potential cyber threats. They also use algorithms to make behavioral models, which they then use to predict cyberattacks whenever new data becomes available. Let’s have a look at the reasons why ML-based cybersecurity has become more crucial than ever. Why Has Machine Learning Become so Important in Cybersecurity? There are several reasons why ML-based machine learning has grown to prominence. Cybersecurity systems can use AI and ML to analyze attack patterns and learn from them in order to prevent them and respond to their changing behavior. It can support cybersecurity professionals in becoming more proactive in terms of preventing risks and dealing with current attacks in real-time. In short, good data and machine learning can make cybersecurity easier, more proactive, cheaper, and much more effective. How can Machine Learning help businesses improve their cybersecurity? AI and machine learning are providing significant advantages to organizations that implement them in their cybersecurity programs. According to a report from the Capgemini Research Institute, 61% of businesses think AI will be needed to find critical threats, and 69% think AI will be needed to deal with cyberattacks. AI and ML can quickly analyze huge quantities of data, making it far faster than manually detecting threats. AI and ML minimize cyber threat detection and response effort, making them cost-effective. The Capgemini report found a 12% average cost reduction. Cyber analysts are alerted aboutattacks and categorize the kinds, which helps them determine the correct response. As more data is analyzed and the technologies learn from past patterns, AI and machine learning improve cybersecurity over time. AI and ML are used by many businesses to rank network threats and figure out which parts have been attacked the most. Businesses use AI to identify malicious activity automatically. AI and machine learning are also being used to detect suspicious user behavior. Many businesses prevent financial fraud by predicting unusual consumer behavior utilizing machine learning. AI and machine learning can also help businesses predict potential cyberattacks. Companies Bolster their Cyber Security Systems through ML Concluding Lines If used correctly, machine learning can improve cybersecurity. Machine learning's dramatic and lasting influence is real. Integrating AI and ML to improve cybersecurity is crucial, but organizations should remember that these technologies are only as effective as the analysts who control and use them.

Read More

Spotlight

CyVantage LLC

CyVantage is a cyber training and facilities design company - currently developing training facilities with academic institutions and commercial experts to improve and maintain the operational readiness of tactical response capabilities for a wide spectrum of enterprises. Rooted in Department of Defense methodologies for developing world-class Cyber Aggressors and Defenders, CyVantage focuses on preparing defenders to operate in real-time, complex, and highly stressful environments. The facilities are state-of-the-art and capable of supporting a variety of multifaceted problem sets, from denials of service to state-sponsored Advanced Persistent Threats. CyVantage leverages expertise and best-practices from industry, the military, and homeland security. The resulting cyber advantage comes from having defenders equally skilled in attack and defense.

Related News

Leveraging Threat Intelligence to Tackle Cyberthreats in Times of COVID-19

Microsoft | June 16, 2020

Each year Microsoft releases its Security Endpoint Threat Report, which offers critical insights into cyber threat vectors identified by analysing. Developed countries can largely be attributed to the varying levels of technological development and cyber hygiene practices, including the extent of the usage of genuine software across the region. According to the Microsoft Threat Intelligence Protection team, every country in the world has seen at least one COVID-19 themed cyber attack. In Asia Pacific, we leverage this data to analyze local trends in the ever-evolving threat landscape. The latest report, which covered a 12-month period from January to December 2019, revealed that developing markets in the region were most challenged by ransomware and malware encounters. In contrast, the developed markets struggled with an increased volume of drive-by download attacks. Within the region, the difference between developing and developed countries can largely be attributed to the varying levels of technological development and cyber hygiene practices, including the extent of the usage of genuine software across the region. According to the Microsoft Threat Intelligence Protection team, every country in the world has seen at least one COVID-19 themed cyber attack, and, of the millions of targeted messages we see each day, roughly 60,000 involve COVID-19 related malicious attachments or malicious URLs, including attackers impersonating established entities like the World Health Organization (WHO) and other health related oragnizations to leverage these organizations’ credibility to trick people into clicking on links in unsolicited emails. Read more: CYBERATTACKS ON CRITICAL INFRASTRUCTURES WITNESS SHARP RISE DURING THE PANDEMIC According to the Microsoft Threat Intelligence Protection team, every country in the world has seen at least one COVID-19 themed cyber attack, and, of the millions of targeted messages . ~ Microsoft In 2020, however, like almost everything else, the global COVID-19 pandemic has upended the playing field, accounting for new risks and trends impacting the volume and nature of the attack vectors. Cybersecurity awareness is particularly crucial at this time, as cyber criminals have taken advantage of the global situation. With business continuity and operational resilience at stake, awareness of key cybersecurity considerations is crucial, as many organizations look at a long-term shift towards work from home. Security has proven to be the foundation for digital empowerment in a remote workforce. Cloud-based endpoint protection technology enables employees to work when, where, and how they need to work and can allow them to use the devices and apps they find most useful to get their work done. After all, security technology is fundamentally about improving productivity and collaboration through inclusive end-user experiences. As organizations adapt to the new reality and its cybersecurity implications, there is an equally critical, if not higher, need to educate employees so they don’t become the weakest link in the security chain. Over the past two years, Zero Trust has emerged as a key security philosophy for businesses. COVID-19 has allowed for a real-life demonstration of why it’s important. Companies relying on traditional ideas of securing workers through “walls and moats” at the perimeter (aka firewalls) were both more susceptible to COVID-19 themed threats and were less able to meet the demands of a newly remote workforce. Zero Trust shifted from an option to a business imperative in the first 10 days of the pandemic. The Zero Trust architecture will eventually become the industry standard, which means everyone is on a Zero Trust journey whether they know it or not. Diverse data for better threat intelligence – A blend of automated tools and human based insights are needed to identify new COVID-19 themed threats. With adversaries adding new pandemic themed lures to their phishing attacks, organizations need to bolster their security foundation with strong threat intelligence, which is derived from analyzing a diverse set of products, services and feeds from around the globe. Read more: GOOGLE TOP CHOICE FOR CYBERCRIMINALS FOR BRAND-IMPERSONATION SPEAR-PHISHING CAMPAIGNS

Read More

Threat hunting technology is on the rise, so are threats

TechTarget | May 29, 2018

Detection of advanced threats is the top challenge for 55% of security operations centers, according to a new survey, as more companies explore threat hunting programs. More companies are adopting threat hunting functions, according to a recent survey from Crowd Research Partners, but detection of advanced threats remains elusive. Threat hunting typically involves human security analysts identifying impending incidents or attacks that automated threat detection systems may have missed. The frequency of threats and the potential damage and impact of security incidents continue to outpace the capabilities of security operations centers (SOC), Crowd Research Partners' "2018 Threat Hunting Report" found. Fifty-eight percent of IT security professionals said cyberthreats against their organizations had doubled during the past 12 months; only 8% indicated threats decreased. SOCs, on average, missed 39% of threats, with the majority of attacks discovered in one to seven days for 58% of organizations. The average dwell time for attackers was 30 days.

Read More

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

PwC | January 19, 2016

CEOs are concerned that cyberthreats could negatively impact their corporate growth, with 61 percent claiming that concern in the PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.The survey polled 1,409 CEOs in 83 countries about the current and future climate of international business. The corresponding report ranks cyberthreats as the eighth most feared impediment to business growth. However, geopolitical uncertainty, especially in unstable regions of conflict where cyberattacks and cyberespionage are a growing threat, was the second largest concern (74 percent), behind only over-regulation.Among industries, the insurance sector expressed the most apprehension over cyberthreats hindering business growth, with 79 percent citing the problem as a legitimate concern. The energy sector was the industry most concerned with geopolitical uncertainty (89 percent).

Read More

Leveraging Threat Intelligence to Tackle Cyberthreats in Times of COVID-19

Microsoft | June 16, 2020

Each year Microsoft releases its Security Endpoint Threat Report, which offers critical insights into cyber threat vectors identified by analysing. Developed countries can largely be attributed to the varying levels of technological development and cyber hygiene practices, including the extent of the usage of genuine software across the region. According to the Microsoft Threat Intelligence Protection team, every country in the world has seen at least one COVID-19 themed cyber attack. In Asia Pacific, we leverage this data to analyze local trends in the ever-evolving threat landscape. The latest report, which covered a 12-month period from January to December 2019, revealed that developing markets in the region were most challenged by ransomware and malware encounters. In contrast, the developed markets struggled with an increased volume of drive-by download attacks. Within the region, the difference between developing and developed countries can largely be attributed to the varying levels of technological development and cyber hygiene practices, including the extent of the usage of genuine software across the region. According to the Microsoft Threat Intelligence Protection team, every country in the world has seen at least one COVID-19 themed cyber attack, and, of the millions of targeted messages we see each day, roughly 60,000 involve COVID-19 related malicious attachments or malicious URLs, including attackers impersonating established entities like the World Health Organization (WHO) and other health related oragnizations to leverage these organizations’ credibility to trick people into clicking on links in unsolicited emails. Read more: CYBERATTACKS ON CRITICAL INFRASTRUCTURES WITNESS SHARP RISE DURING THE PANDEMIC According to the Microsoft Threat Intelligence Protection team, every country in the world has seen at least one COVID-19 themed cyber attack, and, of the millions of targeted messages . ~ Microsoft In 2020, however, like almost everything else, the global COVID-19 pandemic has upended the playing field, accounting for new risks and trends impacting the volume and nature of the attack vectors. Cybersecurity awareness is particularly crucial at this time, as cyber criminals have taken advantage of the global situation. With business continuity and operational resilience at stake, awareness of key cybersecurity considerations is crucial, as many organizations look at a long-term shift towards work from home. Security has proven to be the foundation for digital empowerment in a remote workforce. Cloud-based endpoint protection technology enables employees to work when, where, and how they need to work and can allow them to use the devices and apps they find most useful to get their work done. After all, security technology is fundamentally about improving productivity and collaboration through inclusive end-user experiences. As organizations adapt to the new reality and its cybersecurity implications, there is an equally critical, if not higher, need to educate employees so they don’t become the weakest link in the security chain. Over the past two years, Zero Trust has emerged as a key security philosophy for businesses. COVID-19 has allowed for a real-life demonstration of why it’s important. Companies relying on traditional ideas of securing workers through “walls and moats” at the perimeter (aka firewalls) were both more susceptible to COVID-19 themed threats and were less able to meet the demands of a newly remote workforce. Zero Trust shifted from an option to a business imperative in the first 10 days of the pandemic. The Zero Trust architecture will eventually become the industry standard, which means everyone is on a Zero Trust journey whether they know it or not. Diverse data for better threat intelligence – A blend of automated tools and human based insights are needed to identify new COVID-19 themed threats. With adversaries adding new pandemic themed lures to their phishing attacks, organizations need to bolster their security foundation with strong threat intelligence, which is derived from analyzing a diverse set of products, services and feeds from around the globe. Read more: GOOGLE TOP CHOICE FOR CYBERCRIMINALS FOR BRAND-IMPERSONATION SPEAR-PHISHING CAMPAIGNS

Read More

Threat hunting technology is on the rise, so are threats

TechTarget | May 29, 2018

Detection of advanced threats is the top challenge for 55% of security operations centers, according to a new survey, as more companies explore threat hunting programs. More companies are adopting threat hunting functions, according to a recent survey from Crowd Research Partners, but detection of advanced threats remains elusive. Threat hunting typically involves human security analysts identifying impending incidents or attacks that automated threat detection systems may have missed. The frequency of threats and the potential damage and impact of security incidents continue to outpace the capabilities of security operations centers (SOC), Crowd Research Partners' "2018 Threat Hunting Report" found. Fifty-eight percent of IT security professionals said cyberthreats against their organizations had doubled during the past 12 months; only 8% indicated threats decreased. SOCs, on average, missed 39% of threats, with the majority of attacks discovered in one to seven days for 58% of organizations. The average dwell time for attackers was 30 days.

Read More

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

PwC | January 19, 2016

CEOs are concerned that cyberthreats could negatively impact their corporate growth, with 61 percent claiming that concern in the PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.The survey polled 1,409 CEOs in 83 countries about the current and future climate of international business. The corresponding report ranks cyberthreats as the eighth most feared impediment to business growth. However, geopolitical uncertainty, especially in unstable regions of conflict where cyberattacks and cyberespionage are a growing threat, was the second largest concern (74 percent), behind only over-regulation.Among industries, the insurance sector expressed the most apprehension over cyberthreats hindering business growth, with 79 percent citing the problem as a legitimate concern. The energy sector was the industry most concerned with geopolitical uncertainty (89 percent).

Read More

Events