Cybersecurity challenges in 2013
The issues affecting businesses are similar around the world. The key issues and points of vulnerability are around human engagement - most of it innocently - such as bringing an infected personal mobile device into the corporate network or clicking on a social media link that looks harmless but hides a trojan or worm that will secretly steal data and money and, potentially, remain undetected with severe impact on security of the infected device.
The major cybersecurity challenges to businesses through 2013 will come from:
- an increase in exploit kits,
- an increase in mobile device cybersecurity threats,
- an increase in sophistication of threats.
Increase in exploit kits: Exploit kits represent the dark but massively profitable side of cybersecurity attacks. Exploit kits comprise malicious programs. They quickly identify and then attack cyber vulnerabilities and spread malware. Exploit kits are created, sold and rented on the black market. We predict they will be increasingly used because of their ease of deployment (rental model) and ease and speed of infection they deliver. The impact of these attacks will be felt in loss of data, IP, identify theft, financial fraud and theft, as well as in diminished business productivity and continuity. We expect to see exploit kits targeting Windows 8, MAC OS X and mobile devices, particularly Android based, in 2013 as these three targets represent fast-growing segments used by corporates and consumers alike to transact communications, business and commerce.
The growth of malware will continue at an explosive pace. In 2012, Dell SonicWALL identified nearly 16 million unique malware samples through its GRID (Global Response Intelligent Defence system) compared to 13.5 million in year 2011. Already, there are around 44,000 new malware samples every day.
Increase in mobile cybersecurity vulnerability: The adoption of NFC (near field communication) for mobile payment systems makes mobile platforms a very attractive target for financially motivated cybercrimes. The increased use of personal devices because of trends like BYOD (bring your own device) in businesses creates entirely new cybersecurity issues from loss of company data and IP, financial threat, non-compliance issues to name a few. As social media continues to be adopted universally for personal and business purposes alike, malware will increase dramatically across Facebook, Twitter and Skype in 2013. This triple threat threatens targeted mobile devices at the point of commerce, through their access to corporate networks and through their access to social media channels. It will be particularly dangerous and become more advanced and prevalent.
Increase in sophistication of cyberattacks: Last year, we saw cybercriminals abandon older scareware methods such as fake AV scams and move over to ransomware scams. We expect to see this continue and become more global and multilingual, which also represents a growing threat to LATAM. Ransomware attacks lock down a computer, device or service and holds the entire data hostage or even threatens court action if the user does not pay. These are very devious attacks that are embedded deep into the computer or device and it is nearly impossible for an average user to regain control over his own system and data.
The sophistication and ability to attack and paralyse websites will continue to grow at dramatic pace. For example, in 2011, there were 1,596,905 DDoS (distributed denial-of-service attacks) compared to 120,321,372 in 2012. As businesses of all sizes continue to move services and infrastructure to the cloud, the issue of DDoS will be high on many agendas at it has the potential to quickly cripple entire cloud infrastructures.
Are the risks different for small and large enterprises?
Viruses, trojans, worms, and ransomware do not differentiate between a large or small business. They represent the same risk, no matter if you have a large or only very little budget to invest in network security. Irrespective of the size of your business, these threats can mean loss of profitability and productivity, loss of data and financial assets, and potentially catastrophic loss of business continuity. It is likely that small businesses are more likely to fall prey to these attacks, because they do not have the budget, IT infrastructure or support that a large business can afford. On the other hand, the more people a business employs, the greater the vulnerability of its network.
What steps can business take to protect itself from cyberattacks?
The most important steps for a business of any size to protect itself from cyberattacks is to be aware of the most obvious and dangerous variants. Secondly, it is key to educate employees how to recognise and avoid accidentally bringing a virus/malware/trojan into the corporate network. A recent survey by Dell SonicWALL customers shows that 68% of all businesses reported that employees cannot identify fraudulent attacks on the corporate network.
It is the dirty little secret of the beautiful world of social networks and mobile device interconnectedness that they are a breeding ground for malware and internet criminals. Many businesses believe their existing firewalls will protect them from an attack. The reality, however, is that old firewalls pose a serious security risk to organisations today. First-generation firewalls technology has become obsolete as it fails to inspect the data payload of network packets circulated by today’s internet criminals and to protect from attack. To prepare and protect from the massive growth in social media, applications, BYOD and multimedia files flowing through a corporate network, entirely new technology is needed. It is today’s next-generation firewalls that include advanced technology such as application intelligence and control, intrusion prevention, malware protection and SSL inspection at multigigabit speeds, scalable to support the highest-performance networks and protect them effectively from the modern threats every user of email or the internet encounters on a daily basis.
If an organisation does business anywhere on the internet, it is likely not a question of if, but when it will be targeted by cybercriminals. While no protection is ever perfect, there is much that business can do to minimise and deflect the impact of these potential threats. Especially, the IT organisation should closely collaborate with the company leadership to identify where vulnerabilities lie, prepare with appropriate countermeasures including advanced high-performance, high-redundancy network security components and educate employees for the best possible defence and protection of business assets.
Strategies for navigating Java vulnerabilities
Java remains a robust and widely adopted platform for enterprise applications, but staying ahead...
Not all cyber risk is created equal
The key to mitigating cyber exposure lies in preventing breaches before they happen.
How AI can help businesses manage their cyber risks
Artificial intelligence can be a powerful ally in the fight against cyberthreats.