Losses From Cyber Crime Exceed $1Trillion

All organisations are having problems with cyber crime and with the impact the Coronavirus hacking crime in particular is increasing. The FBI has seen a four times increase in cyber security questions and complaints since the pandemic began and the endpoint security experts at McAfee  say that the worldwide losses from cyber crime have exceeded $1 trillion in 2020 for the first time

Now a new report from Interpol says cyber criminals are targeting larger businesses. Interpol’s assessment of the impact of COVID-19 on cyber crime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure.

Furthermore, 2020 was also a year of significant change for working practices and lifestyles. In the UK, the population spent a significant portion of the year either under lockdown or being recommended to work from home where possible. In 2021, there are many cyber security threats that have either emerged as a result of the pandemic or have been exacerbated by it. Here are some of the cyber security threats facing businesses and organisations in 2021.

Increase in Home and Remote Working

The seismic shift in remote working and online shopping has opened up new concerns over cyber security threats, which means investors need to be aware of the growing opportunities now. Over 50% of the UK population now work from home which raises the cyber security problems considerably. 

Pandemic Phishing

Cyber criminals have of course used the fear surrounding the Covid-19 pandemic as a part of their tactics and virus related phishing became a major problem over 2020 and this looks like it will only get worse in 2021. Criminals use phishing emails to encourage people into clicking a malicious attachment often currently using the concept of Covid-19 and the worries around public health.  

Cloud Breaches

It is also true that the Covid-19 pandemic caused many businesses to alter the way they work and switch to cloud-based solutions. Just as with remote working, moving to the cloud can actually be a major positive, however, doing it too quickly and not taking the time to get the details right can leave your business vulnerable to cyber attacks.

Many organisations simply did not have the kind of IT expertise to manage this kind of migration effectively, and this leads to misconfigurations and other issues that can leave systems with security weaknesses.

Surveillance & Coronavirus

There have been  a lot of discussions on how surveillance technology has been used to contain or combat the virus. 
Initially most prevalent in China, where mass surveillance is already used, stories included facial recognition software and CCTV integrated with AI to track people’s movements from areas that there were known to be outbreaks from, therefore measuring the risk of the potential spread of contamination.

These reports have since seen other nations adopting similar measures, with the additional usage of thermal imaging technology which raises questions about privacy. If mass surveillance measures are introduced with the initial goal of public safety in mind, would it lead to more ‘intrusive’ measures? 

Attacks on the IoT

A growing number of businesses and organisations are implementing Internet of Things (IoT) applications and devices in order to enhance customer service, capture data and manage internal infrastructure. The problem here is that many IoT devices are not designed with security in mind, and may have flaws and vulnerabilities that are both easy to exploit and difficult to fix. If hackers are able to gain control of the IoT devices in an organisation they can potentially use them for access into the rest of the IT system.

Not all vulnerabilities that businesses need to be aware of relate to applications, in fact, in 2021, cyber criminals are increasingly finding weaknesses in the process flow of business operations. By observing the system, criminals find weak links in the processes. For example, a company might be using an automated invoicing tool, which could itself be vulnerable. 

Interpol:           IFSECGlobal:         IFSECGlobal:      City Wire Selector:       McAfee

Your organisation should be doing everything possible to mitigate these risks and find ways to prevent weaknesses and vulnerabilities in your IT systems and at Cyber Security Intelligence we recommend employee and management cyber training. For more information and advice please contact Cyber Security Intelligence.

You Might Also Read: 

Spending  On Cyber Security Will Reach $60bn This Year:

 

 

« Everything You Need To Know About Hashing Algorithms
Use The Military To Attack Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The Josef Group (TJG)

The Josef Group (TJG)

The Josef Group Inc. is a certified woman-owned permanent staffing agency specializing in Information Technology, Engineering, and US Government "cleared" IT candidates.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.