Cyber Attacks Are Growing Ever More Sophisticated


Details of cybersecurity breaches across government, education and industry sectors made headlines, repeatedly, over the past year, with no signs of slowing down. 

Yet despite the frequent incidence, 66 percent of companies report they are unprepared for a major cybersecurity attack, according to a national survey released in November by the Ponemon Institute.

In October, Yahoo reported that a breach believed to have occurred in 2014 affected as many as 500 million user accounts, one of the largest such breaches to date. On Oct. 21, cyber attackers took down the Internet for a large swath of the Eastern United States for most of the day, using a malware virus known as Mirai that attacks vulnerable Internet-connected devices such as web cameras, DVRs and routers.

High-profile cases make it clear, today’s cyber attackers are highly sophisticated. 

The bottom line is Simple

“Companies are going to need to invest in more technology to protect them from security threats,” said Brendan Jacobson, co-founder of NetGain Technologies. “It is just going to get worse.”

It’s not necessarily that the attack tools are getting smarter; it’s the manner in which they are being used. Malicious players don’t even have to be highly tech savvy, said Cody Shackelford, systems engineer with Data Strategy, which acquired Louisville-based boice.net this year.

Basic malware or ransomware packages are readily available on the black market or dark web, he said. Attackers today are succeeding by researching a target company or agency to determine a weak link, for example, a “socially engineered” phishing campaign with an email that looks like it came from and is written in the style of a regular communication partner, perhaps even a coworker.

Organisations can achieve very high levels of protection, though, by employing multiple levels of defense that screen all incoming digital traffic, that restrict anything that does get through to an individual work station, and especially that train workers in best practices for handling data, Shackelford said.

Cybersecurity best practices

Cybersecurity experts agree: The worst possible response to the increasing threat of cyber-attack is to assume you’re not at risk. “These attacks just keep happening over and over again. Businesses are very anxious, and even fearful,” said Scott Logan, technical director of security for NetGain Technologies Inc.

“For a long time, small businesses just didn’t feel like they were a big enough player to be worried about threats,” Logan said. “Their mindset was, ‘I’m not Chase Bank or Anthem,’ and they believed they didn’t have to worry about an attack. But now even small businesses have begun to realize that hackers are increasingly targeting smaller entities, on the assumption that they may be less secure and therefore easier targets.”

To shore up their defense against attack, businesses should first work with their IT or information security team to do a comprehensive risk assessment, Logan said. 

And while each firm’s cybersecurity approach will be specific to its own unique needs, experts did offer these general rules to consider.

  • Ensure baseline security is up-to-date. This includes use of anti-virus software; patching on servers, work stations and routers; implementing a sound backup system; use of firewalls; and “a layered security approach, where there’s multiple points to protect you,” said Joe Danaher, vice president of operations for Integrity IT, a Lexington-based IT and internet security firm.

If your current firewall system is more than five years old, consider investing in a newer one. New models include state-of-the-art intrusion detection prevention systems (IDPS) built in, which can help identify security threats at the perimeter, before they reach the network, Logan said.

  • Install end-point protections. In the past, “end points” (i.e., individual employee computer stations) typically received only a simple anti-virus install, Logan said. In today’s threat climate, that’s not enough.

“They need to have their own intrusion prevention system at that end point so that if it becomes infected, it can’t spread throughout the network,” Logan said. 

  • Update data routinely, locally and off-site. “Because the threats have increased so much, it’s important that you have a good, secure backup,” said Danaher. “Usually what you do, is a full back-up daily and then incrementals timed throughout the day, based on how much data you can stand to lose. Most customers still do an onsite backup, and it’s very important for disaster recovery to have an off-site backup as well,” he said.
  • Phishing emails can spread ransomware. In years past, bogus phishing emails were easy to spot. Not so today. Hackers have gotten increasingly sophisticated at mimicking the look of real emails from businesses, say a bank or credit card company, you routinely interact with. But if an employee clicks on an email containing malware at their work desk, without the proper safety in place, a virus can be unleashed on their company’s entire network system.

Ransomware, in which the hacker encrypts all your computer files and only provides the decryption key at a set ransom price, is on the rise, say experts.

“Phishing and spear-phishing, an email spoofing attack that targets a specific individual, continue to be the biggest threat we’re seeing,” said Greg Garcia, executive vice president of the Washington, DC-based Signal Group, who served as the nation’s first assistant secretary for cybersecurity under President George W. Bush from 2006-08. 

Invest in employee training

“You can spend a large portion of your company’s budget on security technology, and it can be made instantly ineffective by someone getting access to the environment through social engineering,” said Patrick Zanella, security practice lead with Lexington, Mass.-based Integration Partners.

In “social engineering” breaches, attackers email or call an employee or call into a call center and name-drop to sound as if their request for sensitive company information is legitimate.

“The end user, employee, is consistently the weakest link in the security chain,” Logan agreed. “And it’s simply because of this: End users are inherently designed and conditioned to help. They’re in a workplace where they are questioned about information they may or may not know, and they try to provide an answer.”

In March, for example, personal information for 700 current and former Snapchat employees was stolen when hackers posed as Snapchat CEO Evan Spiegel and tricked an employee into emailing them employee payroll data.

Have strong Protocols in place

Experts admit it’s impossible to calculate how cyber threats will continue to evolve, since new iterations come along so fast. (On average, 300,000 to 400,000 new malware files are uploaded on a daily basis, Zanella said.) That’s why developing a sound, holistic cyber security strategy is key.

Training the next generation

Another challenge facing cyber-safety advisors is the scarcity of trained cybersecurity workers nationally. It reports that there are currently more than 348,000 cybersecurity job openings across the nation.

Students studying cybersecurity through Northern Kentucky University’s information technology degree track or its business informatics degree track have no trouble finding jobs upon graduation, said Dr. James Walden, director of NKU’s Center for Information Security, which launched in 2014.

In their cybersecurity coursework at NKU, students learn to set up firewalls, VPNs (virtual private networks) and intrusion detection systems, among other skills. In computer forensics courses, students must investigate the memory of a compromised network system in order to determine what went wrong, Walden said. During their capstone class, many students conduct security assessments for area businesses. Some have even reverse-engineered malware.

“The students get a ridiculous number of job interviews when they finish,” Walden said. “It’s a great time to get into the cybersecurity field.”

Lane Report:                            Cybersecurity: A Personal Plan:
 

 

« France Launches a Cyber Warfare Division
Machines Versus Human Brains – Who Wins? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Softtek

Softtek

Softtek provides comprehensive software Quality Assurance and Testing that identifies the correctness, completeness, and quality level of software products.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

LinOTP

LinOTP

LinOTP is an enterprise level, innovative, flexible and versatile OTP-platform for strong authentication.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.