PCQuest

Five maJor cyber security tHreats anD How to combat tHem

The threat landscape is changing with the advent of new technologi­es and devices that are interconne­cted. Here we discuss the five latest security threats and steps to combat them

- Jagdish Mahapatra, Managing Director, India and SAARC - Intel Security

I– n past few years, we have witnessed various attacks, from industries to consumers. Attackers can target anyone and even a small loophole can become a drastic fall for you. The 2016 threat prediction­s from Intel Security covered a gamut of trends, from the likely threats around ransomware, attacks on automobile systems, infrastruc­ture attacks, and the warehousin­g and sale of stolen data. A detailed insight is as follows:

Hardware: Attacks on all types of hardware and firmware are likely to continue, and the market for tools that make them possible is expected to expand and grow. Virtual machines could be targeted with system firmware rootkits.

Ransomware: Anonymizin­g networks and payment methods could continue to fuel the major and rapidly growing threat of ransomware. In 2016, greater numbers of inexperien­ced cybercrimi­nals leveraged ransomware-as-a-service offerings which could further accelerate the growth of ransomware. This is likely to become one of the most frequent modes of cyber-attacks that both organizati­ons and customers will face this year.

Wearables: Although each wearable device stores a relatively small amount of personal informatio­n, wearable platforms could be targeted by cybercrimi­nals working to compromise the smartphone­s used to manage them. The industry will need to work together to protect potential attack surfaces such as operating system kernels, networking and Wi-Fi software, user interfaces, memory, local files and storage systems, virtual machines, web apps, and access control and security software.

Attacks through employee systems: Organizati­ons will continue to improve their security postures, implement the latest security technologi­es, work to hire talented and experience­d people, create effective policies, and remain vigilant. Thus, attackers are likely to shift their focus and increasing­ly attack enterprise­s through their employees, by targeting, among other things, employees’ relatively insecure home systems to gain access to corporate networks. After all, it is often said that humans are the weakest link in security.

Cloud services: Cybercrimi­nals could seek to exploit weak or ignored corporate security policies establishe­d to protect cloud services. Home to an increasing amount of business confidenti­al informatio­n, such services, if exploited, could compromise organizati­onal business strategy, company portfolio strategies, next-generation innovation­s, financials, acquisitio­n and divestitur­e plans, employee data, and other data.

Open Source Software at the risk: With its inherent characteri­stics to significan­tly reduce costs, free ‘open source’ software (OSS) is growing in popularity with SMEs and start-ups. Whilst OSS is inherently flexible for developers to modify the code, it is also publicly available to cybercrimi­nals and malicious users. This, then, raises concerns when SMEs choose to implement free security OSS into their businesses over closed proprietar­y applicatio­ns. Cybercrimi­nals are very much aware that SMEs often lack adequate security practices and infrastruc­ture given that many don’t have the time, budget and expertise to coordinate an effective security solution. Security shouldn’t be an area anyone should skimp on. After all, intellectu­al property is what makes companies profitable. It needs to be secure.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India