(Written by Jennigay Coetzer for a client)

Cyber threats pose a growing danger to companies and individuals alike, and the risks are constantly evolving like a moving target. An estimated half a million attacks are happening every minute in cyber space, where the bad guys are intent on keeping one step ahead with their latest malicious scheming.

For instance, ransomware attackers have moved into the realm of extortion. Instead of just planting malicious code on victims’ computers that locks them out of their systems, they threaten to release sensitive company or customer data publicly if their demands are not met. High profile examples of this include Sony, Ashley Madison, Anthem and TalkTalk, which were all hacked and their customers’ details stolen in recent times.

Once hackers have control of a victim’s computer they could also sabotage the data by changing and manipulating it. Such attacks would be difficult to detect if the changes were subtle, and could compromise the integrity of the information to the point where it was nonsensical.

Companies are not always equipped to tackle the evolving cyber security threats or do it quickly enough on their own, and there are not enough security professionals in the job market to meet growing demand. So companies of all sizes are partnering with technology providers that specialise in this area and can offer expert advice and affordable solutions that are easy to implement and manage.

Looking ahead and anticipating how cyber security threats are likely to evolve and having a workable plan will help companies to pinpoint their critical vulnerabilities, fine-tune their anti-intrusion strategies and strengthen their defenses to protect their systems more effectively.

As more organisations store all types of valuable data in the cloud, the cyber criminals will come up with increasingly ingenuous ways to gain access to it.

Lack of mobile security governance and access procedures, such as inadequate usernames and passwords and unsecured apps make it easier for them to do this. Statistics show that more than 75% of network intrusions exploit weak or stolen credentials, and more than 80% of employees admit to downloading non-approved online software applications in their jobs.

This opens up serious vulnerabilities, because the sheer number of intelligent smartphones and tablets in use provide an attractive entry point into corporate systems for cyber criminals using malicious apps, web browsing and other devious means.

An escalation of increasingly ingenious cyber security threats is expected in the future, fueled in part by the internet of things as more and more devices are capable of collecting, storing and transmitting data.

These include connected printers, surveillance cameras, cars, medical devices, TVs, coffee makers, refrigerators, baby monitors, and wearable devices, which hackers can take control of to launch attacks on other connected devices, companies, governments, financial institutions, and other categories of victims. Few of these types of connected devices currently have effective cyber security functionality.

Research company Gartner predicts that by 2020 there will be 25 billion connected devices, up from 6,8 billion in 2016. This represents a vast number of entry points for hackers to gain access to personal information and corporate systems.

As future connected devices become more technologically advanced they are likely to be increasingly exploited, not just by hackers, but by activists, governments, mercenaries and terrorists all bent on stealing information of some description.

Malicious code threats include ‘ghostware’ that penetrates networks, steals information and then covers its tracks. This makes it difficult to determine exactly how much data has been affected or hunt down the cyber criminals.

Comments are closed.