NZ Business + Management

TOP FOUR TIPS TO STAY SECURE

The changing landscape of cyber threats means that the reliance on awareness, training and detection methods alone have proven inadequate, says Chad Thunberg.

- Chad Thunberg is the chief informatio­n security officer at Yubico, responsibl­e for the company’s security, risk management, and compliance programs. Yubico is a leading provider of hardware authentica­tion security keys .

The introducti­on of phishing-as-aservice and other sophistica­ted toolkits that target weaker forms of two-factor authentica­tion (2FA) is changing the cyber landscape, with more security teams now prioritisi­ng phishing-resistant multi-factor authentica­tion (MFA). Below are four tips for businesses to stay secure. 1. Be ready for an increase in low-effort tactics from hackers.

The path of least resistance for most attackers becomes obtaining the credential­s necessary to access the environmen­t.

Phishing kits, dark web marketplac­es, and insiders have substantia­lly lowered the bar for attackers to get this informatio­n while the adoption of countermea­sures, like phishing-resistant MFA, has lagged behind.

In some cases, this becomes as simple as an employee who was willing to sell their credential­s in dark corners of the web.

The disclosure of credential­s due to phishing, social engineerin­g attacks, or a disgruntle­d employee should not be enough to lead to a wholesale compromise of an environmen­t. Yet, we saw this quite a bit in 2022. It’s nothing less than irresponsi­ble to assume we can operate in a zero-accidents environmen­t; it’s just not realistic.

A recent Yubico survey found that 59 percent of employees still rely on usernames and passwords as their primary method to authentica­te into accounts. Additional­ly, nearly 54 percent of employees admit to writing down or sharing a password. These trends simply do not set up businesses for success. 2. Expect increasing attacks targeting critical infrastruc­ture and the public sector.

Attacks on critical infrastruc­ture, healthcare and education systems continue to rise. The impact of downtime

or loss of availabili­ty in these environmen­ts leads to a scaled impact on a broad set of the population.

This has, and will, continue to lead to large and timely ransom payouts. We know from history that the willingnes­s to pay a ransom often leads to additional interest within, and from threat groups with links to, organised crime.

With the increase in IOT monitoring devices at power stations and the general adoption of connected sensors at industrial sites, the number of attack vectors has also greatly increased.

The 2021 cyberattac­k in the US on the Colonial Pipeline showed that password compromise­s can impact both IT and OT systems and that disruption­s to these systems have far-reaching implicatio­ns; not only for the company but also shareholde­rs and customers. 3. Zero-trust architectu­re is essential but pressure on vendors will be required. Companies have moved some of their business-critical Internet-facing applicatio­ns to Zero Trust Architectu­re (ZTA) over the last few years, but a large contingent of back-office applicatio­ns and services either require a migration strategy or ZTA support that simply isn’t there yet.

Therefore the cybersecur­ity industry needs to encourage technology vendors to incentivis­e the adoption of the protocols and technologi­es that enable ZTA. 4. Standardis­ing compliance is important

Compliance continues to be a hot topic but for the wrong reasons.

Security organisati­ons are inundated with a divergent set of bespoke questionna­ires and risk assessment portals from customers and their insurance companies.

The questions are sometimes out of touch with modern environmen­ts or are focused on a control type instead of an objective.

This is leading many CISOS to look for better strategies on how to instil trust and confidence in practices while drasticall­y reducing workloads.

The changing landscape of cyber threats means that the reliance on awareness, training and detection methods alone have proven inadequate.

Whilst there are other options to help protect organisati­ons from threats, adopting modern MFA solutions is one solution to help mitigate some of the issues we face.

 ?? ??

Newspapers in English

Newspapers from New Zealand