Top Cyber Threats For Business In 2020

The security threat has seen an unparalleled increase in IT systems and AI analysis which has benefits but is also set to make 2020 a real cyber security problem for most businesses. 

As organisations as diverse as hospitals, banks, schools, and retailers continue to grow their digital infrastructure, they’re in danger of unwittingly expanding their attack surface, offering new opportunities for hackers to make money. Furthermore, the average ransomware payment is growing as criminals become more sophisticated in their attacks.

Attackers focused on larger targets and honed their attacks using social engineering. There is a rising use of ransomware strains that tend to demand higher ransoms, like SamSam and RyukRecently, a top energy executive was tricked into transferring £200,000 of company money to fake recipients  following a phone call from that appeared to come from his boss at the German parent company. 

The average ransomware incident lasted 6.2 days and cost $54,904 in downtime, and the average ransomware-related downtime increased 47% over Q3.

The biggest factor in that increasing downtime is the rising number of compromised backup systems. 75% of organisations that paid a ransom had their backups encrypted by ransomware too. Professional services is the hardest-hit sector at 22.4%, followed by software services (13.8%) and financial services and healthcare, the latter two sectors each garnering 12.1%.

An effective response to these threats will require a blend of best practice basics and a willingness to embrace new security technologies. That’s because, although there will be new hacking tools and techniques to tackle over the coming year, many of the challenges facing organisations will be a continuation of current trends.

Here Are Six Top Threats To Watch Out For:

Leaking Email: Email remains the number one threat vector for global organisations. It continues to be the easiest and most effective way for cyber-attackers to harvest user credentials and personal information, and/or install malware on a target’s machine. In 2020, Chief Information Security Officers CISOs must do more to make this channel more resilient to threats, by investing in Domain-based Message Authentication, Reporting and Conformance (DMARC), enforcing Multi-Factor Authentication (MFA), improving security training and awareness programmes and enforcing other policies such as disabling macros.

New AI-powered tools are becoming more widespread, offering an innovative and more effective way to detect spear-phishing and other fraudulent messages.

Email Fakes and Compromise: Business Email Compromises (BEC) cost organisations $1.3 billion in 2018, half of the total losses associated with global cyber-crimes reported to the FBI that year. Organisations are going to need to build staff awareness raising about the threat into their internal training programmes, as well as rolling out technologies and processes designed to spot and block attacks. 

Deepfakes: An potntiallyy bigger threat is from  AI-based spoof videos and audio. These so-called “deepfakes” are already being used to trick employees into making wire transfers. This is likely to be just the tip of the iceberg, and will need advanced tools and improved employee training to mitigate.

Cloud Platforms: The most obvious manifestation of digital transformation investment is increased spending on cloud platforms. But the advent of hybrid and multi-clouds is creating complexity that many in-house security teams are ill-equipped to manage. 

Ransomware: Over the past 12 months, we’ve seen an evolution of one of the biggest threats of recent years, as cyber-criminals refocused their ransomware campaigns on fewer targets. But that doesn’t mean your business is safe in 2020. In fact, the hackers are going to extra lengths to make sure their attacks are successful, deploying fileless malware techniques, RDP compromise and lateral movement to stay hidden until the time is right to strike. 

Best practice security steps like Multi Factor Authentication (MFA), network segmentation and prompt patching can mitigate many attacks, while regular on- and offline back-ups are essential.

Supply Chain Problems: Modern organisations are nothing without their supply chains. Whether it’s a bakery relying on providers of flour, water and energy, or an online retailer with an expansive ecosystem of digital suppliers, these networks provide the products and services essential to business operations. But they’re also a potential security risk. Hackers will become increasingly adept at exploiting these supply chain relationships to further their own ends.

In 2020 there will be more attacks on Managed Service Providers, which provide a handy stepping-stone into client networks, and digital skimming campaigns targeting the supply chain. The GDPR brought in strict new rules designed to improve transparency and accountability for just these circumstances. 

Chief Information Security Officers would do well to revisit their Service Level Agreements and Partnership agreements to guarantee a baseline level of cybersecurity among all their suppliers, or they will also risk the wrath of the regulators.

Barracuda Blog:      Infosecurity Magazine:      CityAM:       FBI IC3

You Might Also Read:

Why An Effective Security Culture Is Essential For Your Organisation:

Hackers Steal $50 Million From Leading Aviation Design Company:

 

« Britain Allows Huawei 5G Network Access Against US Advice
President Putin Addresses The Russian Tech Gap »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Destel

Destel

Destel is a system integrator and provider of IT services focused on Advanced Network & Security Solutions.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

TryHackMe

TryHackMe

TryHackMe is an online platform that teaches cyber security through short, gamified real-world labs. We have content for both complete beginners and seasoned hackers.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Datos Insights

Datos Insights

Datos Insights is a leading global provider of insights, data, and advisory services to the financial services, insurance, and retail technology industries.