The New Generation Of Cyber Security Threats

Employees working from home have become a tempting target for hackers. Cyber criminals are exploiting the chaos caused by the virus and the proportion of attacks targeting home workers increased from 12% of malicious email traffic before the lockdown began in March to more than 60% just six weeks later. 

Leading AI-driven cybers security firm Darktrace say they detected “a large malicious email campaign” against UK businesses that told employees they could choose to be furloughed if they signed up to a specific unnamed website.

The attacks have increased in sophistication, specifically targeting coronavirus-related anxieties rather than the more usual attempts at financial fraud or extortion. These threats typically aim to sidestep standard cyber security measures that many home workers now have in place, and that means that its necessary to take some extra steps to thwart them.

Phishing attacks, where hackers use misleading emails or fake web sites to trick people into clicking on malicious links or downloading malware onto their computers, have long been one of the most dangerous types of cyber-attacks. The best way to protect against phishing attacks is to be aware of the risks. That means that staff should be educated and reminded never to click on links in emails that they are not expecting, and never to download software from websites that they reach via a link in an email, especially if they purport to contain information about COVID-19.

Hackers understand that there are rich pickings to be had in the cloud, which explains a new type of threat which is emerging: Cloud-Intelligence (AI) technology is advancing at a very high rate, and one area that hackers are likely to use this in the future is in the production of "deepfake" voices which mimic the voice of a real person. 

Using deepfake voice technology, hackers could reproduce the voice of a charity leader, and then call a charity employee working from home. Using the deepfake voice the hacker could then tell the employee to transfer money to a bank account using some plausible pretext.

Reducing human error has as much of a role in cyber security as a faulty anti-malware system. Make sure you know what you can do within your role to protect your company from cyber-attacks and have cyber security training for all your employees. Proper training is a cost effective and usually results in spending less on cyber security because your workforce's activities are tightly aligned to the threats.

Keeping your company safe from cyber threats requires diligence and effective IT cybersecurity strategies.  Combining common sense with good practices can help avoid cyber attack attempts. 

Darktrace:   Cybersecurity Insiders:       Guardian:           CUNA Mutual:       Charity Digital

To reduce the negative effects of cyber hacking one very important part is to ensure your staff and management have effective cyber security training. Cyber Security Intelligence recommends GoCyber. For a free test trial please Click  > Here <

You Might Also Read:

Easing Out Of Lockdown

 

« US - China Conflict Over Social Media
Financial Fraud Using Fake Celebrity Endorsements »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.

8kSec

8kSec

8kSec is a cybersecurity company specializing in training, consulting, and research.

TekStream Solutions

TekStream Solutions

TekStream accelerates clients’ digital transformation by navigating complex technology environments with a combination of technical expertise and staffing solutions.