Losses From Cyber Crime Exceed $1Trillion

All organisations are having problems with cyber crime and with the impact the Coronavirus hacking crime in particular is increasing. The FBI has seen a four times increase in cyber security questions and complaints since the pandemic began and the endpoint security experts at McAfee  say that the worldwide losses from cyber crime have exceeded $1 trillion in 2020 for the first time

Now a new report from Interpol says cyber criminals are targeting larger businesses. Interpol’s assessment of the impact of COVID-19 on cyber crime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure.

Furthermore, 2020 was also a year of significant change for working practices and lifestyles. In the UK, the population spent a significant portion of the year either under lockdown or being recommended to work from home where possible. In 2021, there are many cyber security threats that have either emerged as a result of the pandemic or have been exacerbated by it. Here are some of the cyber security threats facing businesses and organisations in 2021.

Increase in Home and Remote Working

The seismic shift in remote working and online shopping has opened up new concerns over cyber security threats, which means investors need to be aware of the growing opportunities now. Over 50% of the UK population now work from home which raises the cyber security problems considerably. 

Pandemic Phishing

Cyber criminals have of course used the fear surrounding the Covid-19 pandemic as a part of their tactics and virus related phishing became a major problem over 2020 and this looks like it will only get worse in 2021. Criminals use phishing emails to encourage people into clicking a malicious attachment often currently using the concept of Covid-19 and the worries around public health.  

Cloud Breaches

It is also true that the Covid-19 pandemic caused many businesses to alter the way they work and switch to cloud-based solutions. Just as with remote working, moving to the cloud can actually be a major positive, however, doing it too quickly and not taking the time to get the details right can leave your business vulnerable to cyber attacks.

Many organisations simply did not have the kind of IT expertise to manage this kind of migration effectively, and this leads to misconfigurations and other issues that can leave systems with security weaknesses.

Surveillance & Coronavirus

There have been  a lot of discussions on how surveillance technology has been used to contain or combat the virus. 
Initially most prevalent in China, where mass surveillance is already used, stories included facial recognition software and CCTV integrated with AI to track people’s movements from areas that there were known to be outbreaks from, therefore measuring the risk of the potential spread of contamination.

These reports have since seen other nations adopting similar measures, with the additional usage of thermal imaging technology which raises questions about privacy. If mass surveillance measures are introduced with the initial goal of public safety in mind, would it lead to more ‘intrusive’ measures? 

Attacks on the IoT

A growing number of businesses and organisations are implementing Internet of Things (IoT) applications and devices in order to enhance customer service, capture data and manage internal infrastructure. The problem here is that many IoT devices are not designed with security in mind, and may have flaws and vulnerabilities that are both easy to exploit and difficult to fix. If hackers are able to gain control of the IoT devices in an organisation they can potentially use them for access into the rest of the IT system.

Not all vulnerabilities that businesses need to be aware of relate to applications, in fact, in 2021, cyber criminals are increasingly finding weaknesses in the process flow of business operations. By observing the system, criminals find weak links in the processes. For example, a company might be using an automated invoicing tool, which could itself be vulnerable. 

Interpol:           IFSECGlobal:         IFSECGlobal:      City Wire Selector:       McAfee

Your organisation should be doing everything possible to mitigate these risks and find ways to prevent weaknesses and vulnerabilities in your IT systems and at Cyber Security Intelligence we recommend employee and management cyber training. For more information and advice please contact Cyber Security Intelligence.

You Might Also Read: 

Spending  On Cyber Security Will Reach $60bn This Year:

 

 

« Everything You Need To Know About Hashing Algorithms
Use The Military To Attack Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.