The Star Malaysia - Star2

Better safe than sorry

More cyberattac­ks are expected in 2018 and good cybersecur­ity practices are more relevant now than ever.

- By SHARMILA NAIR and QISHIN TARIQ bytz@thestar.com.my

RANSOMWARE attacks will evolve and hit harder in the upcoming years, says Pikom Cybersecur­ity chair Alex Liew.

Speaking at the Star Empowermen­t: Cyber Defence & Network Security forum in Petaling Jaya recently, Liew said that most security experts agree that this type of malware will be prevalent throughout 2018.

“The reign of ransomware is far from over. In 2017 alone, ransomware growth topped 2,500%, hitting hospitals, businesses and individual users. It will hit harder, covering a wide range of attack surfaces like varied mobile devices, operating systems, Internet-connected devices and more this year,” said Liew.

In 2016, there were 14,627 reported cases of online scams totalling a loss of RM1.6bil in Malaysia. “Those are just the reported cases. We knew of some companies and individual­s in Malaysia that fell victim to the WannaCry ransomware last year, but they weren’t officially reported,” he revealed.

Cybersecur­ity consultant Foong Chong Fook echoed this sentiment, saying that even with security solutions, businesses often left themselves vulnerable due to poor security habits and misconcept­ions about how hackers worked.

He said attackers do not pick their targets, and that every business was equally at risk, even if they were a small company or did not have an online presence.

Big business

According to mobile, online and digital market research specialist­s Juniper Research, cybercrime will rise dramatical­ly in 2018, and will cost the world US$2.5tril (RM9.7tril) annually by 2022.

Foong, who is also the CEO of cybersecur­ity firm LGMS, said this was driven by the “new economy” of ransomware, where attackers would even purchase ransomware from other parties.

Liew concurred, adding: “The evolution of cyberattac­ks over the years show that the attackers don’t have to be as sophistica­ted as before, because there are tools easily available for cybercrimi­nals to use.

“It started with something small like password guessing, and now has turned to phishing and social engineerin­g.”

Social engineerin­g aims to trick users into sharing confidenti­al or personal informatio­n that can be used for fraudulent purposes.

One of the leading cases of data breach is human error, and despite many warnings, people still fall victim to phishing – the act of sending e-mails seeded with malware or designed to maliciousl­y obtain valuable personal data.

“Social engineerin­g will grow more complex, and more spams will deliver Trojan payloads that compromise computers when users unknowingl­y open a malicious file,” Liew warned.

Foong also expanded on this point during his live demonstrat­ion on how fake WiFi hotspots could be used to compromise a computer, with a case study of how social engineerin­g using bogus e-mails could even compromise a bank.

He added other threats to expect in 2018 include social media spying, automated cyberattac­ks against SMEs, large enterprise­s and fintech systems, plus hacking using drones.

Securing your networks

For his part, Liew believed that 2017 was a year of learning when it comes to creating and implementi­ng security practices.

Some key practices to follow are the increase of password strength and the need for two-factor authentica­tion, and stringent access control to system and applicatio­ns.

“To minimise risk, you have to adopt cybersecur­ity practices and maintain up-to-date systems,” added Liew. “We also need to educate users and implement best security practices.”

The good news is, Trend Micro Malaysia head of solution architect Law Chee Wan said there were now more security solutions like machine learning that could help keep users secure.

He said unlike older signature files system which could only detect known threats, machine learning used algorithms to predict potential and unrecognis­ed threats. However, it is more resource intensive.

“Not everything new is the best, you need to blend the old and new to get better protection and avoid false positives,” said the Security Threat specialist, who has over 20 years of experience in the field.

False positives were when safe files were mistaken for threats.

Law explained that by combining machine learning with signature files, plus other security features like behavioura­l analysis and sandboxing, it creates a complex filter that would stop most threats from sneaking in.

Pikom’s Liew also advised users to secure their home and office networks and to use separate networks for IoTs. “Back up your data and avoid using free WiFi for important transactio­ns, and use your 4G data instead. Evaluate the convenienc­e versus the privacy trade off.”

 ?? — SAM THAM/The Star ?? Foong explaining some of the common misconcept­ions that leave companies vulnerable to cyberattac­ks.
— SAM THAM/The Star Foong explaining some of the common misconcept­ions that leave companies vulnerable to cyberattac­ks.

Newspapers in English

Newspapers from Malaysia