The Metaverse: A Reality Check

From virtual meetings to immersive 3D customer experiences, or even property tours, the Metaverse will transform the way that companies operate. Gartner predicts that by 2026, a quarter of us will spend at least one hour a day in the Metaverse for work, shopping, education, social media and/or entertainment. 

Some brands are already there today, such as Nike and Coca-Cola, who are using it to drive brand awareness and the purchase of physical products. It’s easy to see why more and more companies will start to do business there.  

But are they thinking about the risks? We will certainly need a different approach to security in a virtual world compared to the physical, but what will that entail?  Let’s take a look at what the risks are and how to start getting prepared, because you do need to start now. 

The biggest hurdle to the Metaverse being a secure environment is in its foundations. The Metaverse is built on blockchain technology and we have already seen serious security gaps in crypto currency marketplaces and blockchain platforms.  Due to the sheer amount of malicious activity exploiting services based on the blockchain it won’t be long before initial attacks in the Metaverse begin.

This will likely be based on authorisation in which user accounts will be hijacked, with identity and authentication being the critical attack vectors. For example, some people might want to have multiple identities within the Metaverse, perhaps one for transacting work conversations and another for personal shopping and entertainment. 
This adds another layer of complexity as there’s then no single identity that can verify it's definitely you.

The answer could be in 'chained identity' - using blockchain to  confirm who we are transacting with -  although this is a major challenge, since blockchain technologies are decentralised and unregulated, which makes things like policing the theft of virtual assets or preventing money laundering very difficult.

Redefining Reality 

Another key security challenge is in the safe spaces needed to conduct business. Imagine you’re on a Zoom or Teams call. It’s a private meeting space - but what will that be like in the Metaverse? How do we know that a chair someone is sitting on isn’t actually an avatar and we have an impostor in our midst? You may think that would be impossible, but it's a virtual world. Of course, it can.

We need to be able to discern between what’s real and what’s fake and having a safe space to meet and transact will be crucial.

When the Internet first came out, threat actors exploited the average human’s unfamiliarity with the tech by creating malicious sites that impersonated banks to obtain financial details. Phishing scams like this still occur, albeit we now see more sophisticated forms of social engineering. 

The Metaverse is like a whole new Internet, and you can guarantee that people’s unfamiliarity with it, both businesses and consumers, will be exploited.

Interestingly, every transaction that happens on the blockchain is fully traceable, so this will become far more important, especially when it comes to having an audit trail of what has been discussed and any decisions made in a business context. But that leaves a question over how that information is taken from the virtual world to the physical.

Are contracts going to be legally binding in the Metaverse? Or will they need to be brought into the physical world to be signed and then pushed back in? How will that be done securely? 

Researchers have discovered security gaps within blockchain and crypto projects which are part of the Metaverse. 
The vulnerabilities that been exploited by cyber crime are focused on vulnerabilities with smart contracts that allows hackers to exploit and drain crypto platforms and around application vulnerabilities inside blockchain platforms that allows hackers to attack through the platforms and hijack users’ wallets balance. 

There is a danger that we rush headlong into the Metaverse without considering these types of implications. 
A lot of the concerns around security in the Metaverse are exacerbated by the huge skills shortage in the cybersecurity sector. According to the 2021 (ISC) Cybersecurity Workforce Study, there is a shortage of 3 million cyber security professionals and the current global cyber workforce needs to grow by 65% to effectively defend organisations’ critical assets. That percentage is likely to be a lot higher if we also consider the new virtual world.
Is it worth it? 

Other cyber security risks within the Metaverse abounds such as cyberattacks via the use of vulnerable AR/VR devices, as an entryway for evolving malwares and data breaches. These devices inherently collect large amounts of user data and information such as biometrics, making it attractive to hackers. Concerns around data privacy are also a growing voice amongst Metaverse sceptics, with additional data being collected through avenues like Second Life, potentially violating user privacy.

You might wonder why bother if there are so many risks involved? But it is absolutely worth putting the time in now, to get ready for moving across to the Metaverse. Any company that doesn’t, may find itself in a place where it’s playing catch up and potentially losing out on business or engaging in processes that put the business at risk. 

Organisations will need to be much more reliant on their partners around the world to help mitigate risk, as this is very much a global phenomenon. But there will always be some risk and for for those that get it right, there will be huge rewards.  

Top Metaverse Security Considerations 

1.    It's coming. You can't put your head in the sand and pretend that it isn't. Business leaders and security professionals need to talk about it and understand what it might mean for them. Understand the landscape by looking at what competitors are doing in that space.

2.    Have a look at how you are currently running services now in the physical world and understand if these services map in any way to the Metaverse. You may find that some of them don't and aren't even secure in this world, such as mobile devices, tablets, cloud and multi-cloud.

3.    Understand how to get your identification and authentication done correctly. The answer to that isn't just having a password or two factor authentication. Companies need to really start upping their game around these two issues. People tend to do things without thinking about security, whereas they should be thinking of security first.

Businesses won’t be able to do it themselves, it will take a great deal of partnering with organisations that work within that space. The Metaverse will hit everyone, and there’s no denying that mistakes will be made, similar to those that were made in the early days of the Internet.  

You Might Also Read: 

Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse:

 

« EU Businesses Risk Fines For Not Complying With IoT Security Rules
US Defence Needs New Software at the Centre of its Operations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Industrial Cyber Security

Industrial Cyber Security

Industrial Cyber Security provides specialist consulting services in enterprise and SCADA system security.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Infosec Cloud

Infosec Cloud

Infosec Cloud is a specialist Cyber Security company offering fully managed Training & Testing Services in addition to market leading Cyber Security technology and accredited professional services.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.