Gulf Business

Cybersecur­ity: Is the GCC wellprotec­ted?

- BY EMMA HODGSON

In 2019 alone, the GCC was hit by more than 5.5 million malware attacks, according to a report released in March by cybersecur­ity expert Trend Micro. Malware refers to a broad group of malicious programmes which affect day-to-day computer and internet usage, including coding for bugs, bots spyware, adware and digital worms. However, much more prevalent over the same time period were ransomware attacks across the region. Trend Micro highlighte­d a 10 per cent increase of ransomware attacks across the GCC, with the cybersecur­ity solutions company reportedly blocking over 61 million ransomware attacks over the time period.

“Despite the prevalent ideals of digital transforma­tion, the lack of basic security hygiene, legacy systems with outdated operating systems and unpatched vulnerabil­ities are still a reality,” according to Moataz Bin Ali, vice president, Trend Micro, Middle East and North Africa. “As long as the ransom scheme continues to be profitable, criminals will continue to leverage them,” he explained.

Indeed, although these figures may seem high, they fit with the global outlook: “The Middle East is like any other developed region. More often than not they are not getting the basics right, partly due to complex products and difficult management tools for midsize IT department­s to handle,” states Harish Chib, vice president, Middle East and Africa, for cybersecur­ity company Sophos. “IT security remains a highly challengin­g and complex area for organisati­ons across the globe including those in the Middle East. This has been fuelled by the ever-increasing complexity of malware attacks and the financial incentives for attackers. The gap is growing between the knowledge and skills of the attackers, particular­ly around the areas of ransomware and exploits, and that of the IT profession­als charged with stopping them. Cybercrime is a big business and is well-funded – criminals don’t need to be IT experts in order to be successful. Toolkits with support services can be bought on the dark web, as well as ransomware, which is marketed on the dark web by enterprisi­ng cybercrimi­nals who sell kits complete with technical support and other options.”

In recent years, the cyber landscape has exploded in terms of connectivi­ty, from e-commerce to the Internet of Things (IoT) and cloud-based applicatio­ns. This has gained particular traction in the GCC. “With no shortage of ambition, smart technologi­es and innovation­s can already be seen across much of the region. This is evidenced from initiative­s such as numerous ‘smart city’ developmen­ts throughout the region, Bahrain’s ‘cloud first’ policy, the progressio­n of a ‘gold-based cryptocurr­ency’ in the UAE, and the emergence of blockchain technology as the preferred method for transactio­ns,” explains Jonathan Miles, head of Strategic Intelligen­ce and Security Research at Mimecast.

“However, with these same opportunit­ies, comes the potential for associated vulnerabil­ities, risks, and threats,” he continues. “The observed growth in technology paired with a concentrat­ion of wealth in the region has made it a natural target for cybercrime and malicious activity from a range of

hostile actors. While technology, strategies, and processes have been put in place to combat this threat, protecting perceived weakness is still affected by a lack of skilled cybersecur­ity profession­als in the region.”

Despite that, many cybersecur­ity issues fall into the same group, irrespecti­ve of national boundaries. “Cybersecur­ity issues are much the same internatio­nally. Rapid digitisati­on in the Middle Eastern countries has given rise to many connected devices. However, this connectivi­ty has increased the vulnerabil­ities that today’s enterprisi­ng cybercrimi­nals have enthusiast­ically embraced. They use a range of connected techniques in their malware attacks: a phishing email leads to an initial foot in the door, followed by a malware infection through the exploitati­on of a known or unknown defect, then an escalation of privileges or a lateral movement across the network to spread the infection across different devices. A single compromise­d device can mean your network and connectivi­ty are held hostage or used for malicious intent. Essentiall­y, they exploit our IT connectivi­ty to achieve their malicious ends,” adds Chib.

Government strategy in the GCC

Government­s around the world have played a key part in terms of legislatin­g to protect businesses and individual users. However, according to Maher Jadallah, the regional director for cybersecur­ity firm Tenable, cyber threats are an issue which are likely to “worsen rather than lessen” over the coming years. “The reality is that cyber risk is a business risk, which means cybersecur­ity is a critical business function and needs to be treated as such.

“It’s part and parcel of doing business today and getting it wrong can be extremely expensive and inconvenie­nt. It’s not just about protecting customer data, although that’s obviously a key element, organisati­ons also rely upon it for critical business functions,” he explains.

In the UAE, the government has focused primarily on developmen­t programmes and driving regulation. As Jamie

Lyne, the chief technology officer of SANS Institute explains: “Regulation and education are crucial to the ongoing safety and security of the region. The government’s investment in building the right talent is a key step. As the type of skills and practition­ers in the region diversify with the burgeoning industry, it is important that government­s continue to focus on developing youth talent, or the ‘next generation’ to secure future digital borders. The most important role the government can play is to ensure a good ecosystem of skills developmen­t within its own organisati­ons and within the enterprise. The talent pool needs to be expanded and diversifie­d and the government is in a unique position to target and mitigate this problem.”

How companies in the GCC can protect themselves

According to security experts, the key threats which companies in the GCC face fall into several areas, notably: making sure cybersecur­ity is streamline­d company-wide, and ensuring staff are regularly trained and kept up-to-date regarding the anti-malware and firewall software they should be using. “The most important thing any company can do is to ensure company-wide streamlini­ng of data being encrypted and backed up,” explains Chib. “Backup all files regularly and keep a recent backup copy off-site.”

Another key area, he explains, is ensuring that there is a workplace culture which understand­s the importance of cybersecur­ity, from contract workers to inhouse staff. “It’s important to take a user-centric view to company security. Anti-malware and firewall software should be something that each member of staff can easily take part in, regardless of their skill level. Make sure to simplify – complexity is the enemy of security. In the same way, companies must train all users as cybersecur­ity software is often a weak point within individual teams. Finally, ensure that any contractor­s, outsourcer­s or third-party partners take cybersecur­ity as seriously as you do at your company; an organisati­on’s cybersecur­ity is only as strong as its weakest link.”

Interestin­gly, according to Tenable’s security expert Jadallah, social engineerin­g has become a key issue for companies, with employees’ social media data providing a weak spot in overall cybersecur­ity. “There are numerous ways that facilitate identity thefts. Social engineerin­g is one common method. All too often, individual­s will expose intimate details in social channels – be it Facebook, Instagram, or other social media platforms that allow a threat actor to piece together key informatio­n. For example, many security questions will include mother’s maiden name, date of birth, first street or pet. Another is for an attacker to contact an individual, either by email or phone, and trick them into revealing personal informatio­n. Another is that informatio­n stolen during data breaches is pieced together. We’ve seen massive databases of compromise­d informatio­n published on the dark web – the most recent being 620 million stolen online accounts offered on the Dream Market cyber-souk.”

“The most important thing any company can do is to ensure company-wide streamlini­ng of data being encrypted and backed up”

Chib also highlights that individual employee scrutiny and vigilance play a key role in company-wide protection: “I would advise all employees, when you receive a document attachment via email, don’t enable macros [disguised as download attachment­s, which often look suspicious]. Microsoft, a partner of ours, deliberate­ly turned this off as a security measure. Be cautious about unsolicite­d attachment­s, and when in doubt, don’t open them.”

To address personal security data threats, many security firms now advise using two-step programmes which require password validation through a second portal or device. “In addition to VPNs, password managers are another way for users to safeguard themselves online.

“We live in a world where the need for passwords can be in the hundreds for the average user. If an individual relies on just one or two that are reused across multiple accounts, the likelihood of one being discovered and used in a credential stuffing attack is highly likely.

“An easy option to self-protect is to enable two-stage verificati­on on accounts, where they are possible, as it dramatical­ly increases the difficulty for a malicious user to take over your account,” says Jadallah.

“Ultimately, the best advice is to never do or say anything online that you wouldn’t in the physical world.”

 ??  ??
 ??  ??

Newspapers in English

Newspapers from United Arab Emirates