A Cyberattack Is The #1 Risk For Business

British Prime Minister Theresa May wants a new “deep and special” security partnership between the UK and the EU after Brexit, focusing on military, intelligence and counter-terrorism. What about cybersecurity?

Recently the UK National Cyber Security Centre revealed the charity sector is particularly vulnerable to attacks.

The week before, UK think tanks were hacked by groups in China, and the US is leaning on the UK for insight into cyber defence. A cyber arms race is developing, with cyber war on the horizon.

Businesses and the public sector must now push through effective cyber security initiatives to help mitigate this looming threat of cybercriminals, who are effectively open-sourcing their malware codes and creating unique, and largely undetectable threats known as ‘malware cocktails’.

Less is More

SonicWall, a cybersecurity company, have released a report, suggesting that less attacks may mean more destruction for organisations. It found that despite ransomware levels falling, with attack dropping from 645 million attacks to 184 million between 2016 and 2017, but the threats posed by the malicious code are more dangerous than ever.

 “The cyber arms race affects every government, business, organisation and individual. It cannot be won by any one of us,” said SonicWall CEO Bill Conner. 
“Our latest proprietary data and findings show a series of strategic attacks and countermeasures as the cyber arms race continues to escalate. By sharing actionable intelligence, we collectively improve our business and security postures against today’s most malicious threats and criminals.”
“The risks to business, privacy and related data grow by the day, so much so that cyber security is outranking some of the more traditional business risks and concerns,” said Conner.

Security Industry Advances

Even with WannaCry, Petya, NotPetya and Bad Rabbit ransomware attacks stealing the headlines, the expectations of more ransomware attacks simply did not materialise as anticipated in 2017.

As revealed earlier, the total volume of ransomware attacks has declined. However, web traffic encrypted by SSL/TLS standards made yet another significant jump in 2017, increasing by 24%. This shift has already given more opportunity for cybercriminals and threat actors to hide malicious payloads in encrypted traffic.

Information-Age

You Might Also Read: 

Crime Has Become Cybercrime:

Cyber Criminals Catch Up With Nation-States:
 

 

« Russia Warns UK Against Cyber Retaliation
Gina Haspel Is Appointed CIA Director »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.