Cyber Security Threats Are Growing In 2019

Hacking and attacks have considerably increased in and since 2018 and so it is important to review your prospects and security against cyber-attacks in the second half of 2019.  

Cyber-crime in 2018 has hit business with an increasing amount of costs. This has been significant as cyber criminals have learnt from their own history and are now far more effective in their attack and steal processes. 

Many of the cyber-criminal groups are organising themselves along more traditional business processes and are improving their criminal effectiveness.

  • 65% of large UK firms realised that they had been cyber breached and attacked in 2018 and ransomware has become more common as a method criminal profit.
  • 2018 also saw a massive increase in global cybercrime with Interpol reporting that it now runs in the billions of euros/pounds and dollars. 

Now cybercrime is fastest growing areas of global crime and now instead of a few small groups and some individuals committing the crimes. threat groups have now grown and are very similar in sophistication and process to large traditional business models.

The crimes themselves have not changed dramatically as the criminals are still taking money from stealing fraud, theft, gambling and illegal drug and fake medicine sales but the expansion of the criminal activity to cyber-crime is far more effective and profitable for criminal business in general. 

  • The UK’s Office for National Statistics (ONS) said in 2018 that computer misuse and malware against business was significantly increasing and was up 63% in a year.  
  • The UK’s National Cyber Security Centre (NCSC) which is part of GCSQ has said that cyber-crime has now reached its highest level to date and is asking all governments to advise all business to improve their cyber-security standards and actions.
  • The UK has made some progress but more police training is required as cyber-crime is now considered by CSI to be over 1% of GDP by the end of 2019. 

One of the current problems other than a lack of real cyber training for all police officers is that many businesses are still not reporting cyber-attacks as they are concerned about the public relations effects.

Cisco now has a contract to train 120k police officers in the UK on cyber security however it is still the case that trying to report a cyber-crime to the police in the UK is not easy and it often means that they send victims who have had their bank accounts robbed are sent by the police back to their bank rather than the police dealing with the crime.  

The problem for the police is that they are already overstretched with the numbers of police at its lowest level since 1981 and the numbers continue to fall and so there is no capacity within the forces to spend the necessary time on cyber-crime. 
Budgets for electronic systems has not for most governments, police services or commerce grown yet the potential for cyber-attacks has increased significantly and this reality will become more of a problem for many organisations over the coming months. 

There are no simple answers but staff training, understanding your security issues and more carefully managing your data has become crucial.  

There are a number of issues you should be monitoring, including such areas as your use of cloud, training to reduce phishing attack effects and where a lot more different systems are connected.  As the use of cloud based systems increases the security issues will increase and your own IT people should monitor and check your cloud use.

It is very important to ensure that as changes and up-grades to your systems take place that all old systems are effectively cleared and completely separated from the new up-grades as entering your new systems from your old technology is a way cyber-attacks use as it is often one of the easier ways into your new system.

It has been true of some of the analysis we have done over the past years that there has been a significant increase in internal and recently left employees IT problems. 

Often this is due to lack of training or when an employee leaves either through redundancy or because they have had an argument with their colleagues and or management or just because their access to the system has not been completely shut-down and so they still have access. 

By Alfred Rolington:

You Might Also Read:

E-Fusion And Industry 4.0:

Cyber Knowledge The Easy Way:

 

« GDPR Requires Better Methods Of Authentication
What Is The Dark Web? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

Future Planet Capital

Future Planet Capital

Future Planet is the impact-led, global venture capital firm built to invest in high growth potential companies from the world's top research centres.

StrataCore

StrataCore

StrataCore is a single-source technology lifecycle advocate that works behind IT teams as a strategic partner to help them achieve peak enterprise outcomes.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

Assured Clarity

Assured Clarity

Assured Clarity are a global consultancy, specialising in Risk Management and Data Privacy, through Education, Awareness and Training, throughout an organisation.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.