Three Cybersecurity Trends Business Should Address

The cybersecurity landscape grows seemingly more complex, and dangerous, by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on more mission critical systems.

Yet, organisations attempt to counter their threats with the same limited resources. In fact, many industry veterans need to return to the ranks as practitioners and researchers to supplement gaps within security teams. We’re also seeing cyber-security personnel shortfalls at the executive and board levels.

The upshot: IT departments are struggling to keep up with it all. So they must arm themselves with the best, and most current, information about developing threat patterns as they take hold. The following trends have emerged as immediate and urgent:

Weaponisation of the Internet of Things

After the Dyn DDoS attack last year that brought widespread outages to Twitter, Airbnb and other ubiquitous websites, apps and services, hackers continue to target, and weaponise, IoT-linked devices.

More than ever, adversaries are gaining access as a result of employees logging into their work networks from home or other environments outside the office. Many users, both consumer and enterprise, are unaware of the risks associated with unsecured devices, particularly as the universe of connected home and office devices multiplies exponentially on a regular basis.

Cyber-criminals consider these devices as prime entry points and targets for infection, bringing home and business networks to a crippling halt.

Cloud attracts a new breed of bad guy

Hackers are also taking advantage of vulnerabilities associated with cloud and virtual networks. Hypervisors, for example, enable IT to run multiple operating systems on a single system and manage how cloud and virtual resources are allocated.

They would normally reduce an attack surface. But if a singular hypervisor vulnerability is exploited, the impact of the attack can spread to all tenants, operating systems, etc. running in a shared environment. This poses a major challenge for cloud service providers, especially as more advanced hypervisor exploits target the growing landscape of virtual environments.

In addition, remote access Trojans (RATs) are wreaking havoc on cloud networks. State-sponsored adversaries use these malware programs, designed to spy directly on users, to gain entry to government and large enterprise networks for corporate and political espionage.

This type of activity is achieved by infecting web sites that hackers modify to include malicious i-frames or links that will load RATS onto innocent visitors to the website. An ongoing influx of investment into infrastructure and business, along with sustained economic growth, will only fuel more of this activity.

The not-so-emerging threat

Organizations and even individual security experts get caught up with the latest and greatest exploits, vulnerabilities and bugs that are making the biggest headlines. The newest and most startling cyber-attacks, the shockingly duplicitous ones with exotic, ominous-sounding names, rightly command our attention.

However, they aren’t necessarily causing the most damage for the largest number of people. Often times, the age-old, tried and true vulnerabilities are the culprits, such as the failure to patch old Windows exploits or a suspect WordPress plug-in or yet another phishing scam. In today’s world, non-patched systems constitute a compromised enterprise.

Taken as a whole, these three trends reveal that, despite continued technological innovation, malicious hackers will always find gaps to exploit. Organisations cannot afford to lull themselves into a state of false comfort by strictly investing in firewalls, patches and other traditional defense tools. They must arm themselves with the most relevant and timely intelligence, and then allocate solution and “people” resources accordingly.

HelpNetSecurity:

You Might Also Read: 

What Every CISO Needs To Know:

The New Face of Cybersecurity:

Directors Report: Cyber Security Checklist For Management (£):

 

« UK Robotics, AI & 3D Printing
What Healthcare CISOs Should Know »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.