Tuesday, March 23, 2021

Cyber security Threats in 2021: Where Are Security Gaps | Total Security Software

In 2020, the number of cybersecurity threats as a result of the corona pandemic increased significantly worldwide. Savvy cybercriminals found new ways to exploit vulnerabilities with the trend to work from home during the crisis. For example, computers used in the home office were hacked. New phishing attacks triggered by buzzwords such as “diagnosis of the virus” or “economic stimulus package” also appeared for the first time. Widely used technical systems such as Windows PowerShell were targeted and login details for Zoom were stolen.


Cyber Security Threats in 2021 | Total Security Software


What about the biggest security threats a year later? A large number of the dangers mentioned have not yet been eliminated this year. Also, new security gaps appear. Cybercriminals continue to force the attack methods that have proven so successful over the past year and develop new threats to exploit the most important vulnerabilities in today's IT landscape.

Threat #1: Extending the Perimeter to Employees' Homes

Due to the increasing number of employees who have been working from home since 2020, companies are expanding their perimeter to include the apartments of their workforce. As a result, security professionals have difficulty using traditional perimeter monitoring and access controls such as firewalls and intrusion detection systems to monitor their internal networks. Also, 84% of all IT executives expect a further and more permanent spread of homework even after the pandemic, which means that these challenges will accompany us this year and beyond.

IT teams must therefore increasingly rely on effective systems for endpoint security, such as tools for Mobile Device Management (MDM) and Secure Access Service Edge (SASE). Such tools provide better visibility and control over the data, including when it comes to third-party applications like Zoom, Slack, and Microsoft 365. This approach also includes traditional means of securing endpoints by ensuring that security tools such as malware -Protection installed, total security software patches up to date, secure configurations set and endpoints protected.

 

Threat #2: Criminals Become Aware of External Hacker Attacks

With the successful SolarWinds hack, the subsequent attack on over 300 of the company's customers, and other third-party data breaches, more and more companies are shifting their focus to their third party risk management programs. This development illustrates the increased sophistication, complexity and tenacity of the attackers.

Mergers, acquisitions and licensing management should work more closely with the governance, risk assessment, and compliance teams to prevent such third party attacks from disrupting their networks. A thorough security check of all external providers are crucial. Also, such in-house cooperation prepares companies for compliance regulations that will be more effective in the future, which will require more comprehensive and sound risk management programs for third parties.

 

Threat #3: Growing Ransomware Attacks

The number of ransomware attacks rose significantly in 2020: According to the FBI, it grew by 300% by April alone, and by the middle of the year, it had increased sevenfold. In 2021, it looks like attacks of this type will continue to be among the strongest threats.

One The reason for this is that more and more companies are taking out insurance against ransomware, which has not escaped cybercriminals. Since the companies are covered by insurance, the amount required to decrypt the data is simply paid instead of repelling the attack. The attackers achieved quick successes.

A good approach to preventing ransomware attacks is to go back to the basics of cyber hygiene. This includes, for example, timely patching, enforcement of the principle of “least access rights” and regular backups in secure storage locations.

 

Threat #4: New Forms of Phishing Email Scams

In 2020, both the number and the complexity of attacks with phishing emails continued to increase. Cybercriminals use phishing to distribute malware, steal access data, and fraudulently deprive users of their money. Study results show that at the beginning of the pandemic, users were three times more likely to Click on a phishing link and enter their login details. In a survey conducted in mid-2020, 38% of respondents said that one of their colleagues had been a victim of a phishing attack in the past year.

Although phishing attacks did not change fundamentally in 2020, the actors adapted their strategies over the course of the year and adjusted their keywords to new areas of interest in the population. At the beginning of the year, attackers preferred to use catchwords such as “pandemic” and “COVID”. As the public discussion moved in the direction of possible solutions for overcoming the crisis, attackers switched their vocabulary to emotionally charged terms such as “vaccinations” and “aid money”.

Unfortunately, there is no one-size-fits-all solution that guarantees you can ward off malicious emails. However, with the help of a combination of coordinated systems and trained staff, you can reduce the threat of phishing emails:

  • Run the technical security controls on your email platforms.
  • Mark e-mails sent by non-company senders as "external" with a banner.
  • Use analysis tools for emails that detect the content of untrustworthy senders as well as newly created, only temporarily used email accounts and domains.
  • Implement a comprehensive security awareness program for your employees so that they can recognize phishing attacks that could not be blocked beforehand.
  • You can also simulate phishing attacks in the company so that your employees know what to do with suspicious emails.

 

What Is Your Cybersecurity Risk Score?

It is important to understand the maturity of your cybersecurity program to make informed decisions about how to counter attackers and the tactics, techniques, and procedures involved. With this self-assessment of your cybersecurity risk, you are taking the first step in the right direction. After answering these simple questions about your cybersecurity technology, your processes, and your people, you will receive a cybersecurity risk assessment based on our benchmark. This will help you discover common security vulnerabilities in your environment that you may not have been aware of.

No comments:

Post a Comment

Security Awareness in The Home Office | Antivirus Software

There is still a deep gap between the importance and actual implementation of security awareness measures in the home office. The Corona per...