Cyber Security in 2017…
What to Expect from Future Cyber Security Attacks in 2017?
We have seen a major increase in cyber crime over the last 3 years alone! From Target to Sony to Airline’s and Banks. Cybercrime becomes more advanced, sophisticated, and adaptive to the solutions available. I find when working with most clients, they are protecting their North and South network traffic, but fail to provide adequate protection on the inside. What are businesses doing to protect east and west network traffic? How can businesses afford to look for anomaly’s that are happening inside there infrastructure? Do most businesses have the tools and resources necessary to stop grain of sand attacks or phishing attacks?
In my experience, I find that most businesses do not have enough personnel or equipment to provide the protection needed against todays threats. We find that a lot of businesses are going to Managed Security Solutions. A friend of mine told me a phew years back, “As technology adapts and evolves it will take over a Million dollars to protect your infrastructure from a $50 exploit!” I find that to be shockingly true…
Cybersecurity professionals predict that cybersecurity spend will grow around 15% each year for the next 5 years. Some businesses are already spending more, like Target, and Chase who have DOUBLED their cyber security budgets this year.
Below are just 5 of the issues that our Partners are predicting to see this year!
- Frequent phishing attacks
Last year the number of phishing attacks increased dramatically. That is likely to continue in the coming years. According to recent studies and partners, around 200,000 malware samples were discovered every day last year. These attacks are becoming more and more difficult to stop. They combine phishing with other criminal techniques, including exploits like ransomware, remote execution and privilege escalation.
- Multifactor Authentication
Multifactor authentication is a powerful way to block attackers. Multifactor authentication requires users to use different types of ID before logging in; One example would be, a username and password plus a security image, or security phrase/keyword. Adoption of multi factor authentication is likely to remain low. And if that remains true, attacks are likely to become even more common this year. Even the best platforms and security won’t work if end-users won’t use them.
- DDOS Attacks & IOT botnets
Hackers Love the Internet of Things as its all open game. According to recent studies one of their techniques combines distributed denial of service (DDoS) attacks with IoT botnets that can penetrate devices like IP-enabled surveillance cameras and routers.
Many organizations will find that their endpoint protection and firewalls are becoming more and more vulnerable. That’s because most IoT breaches operate under the radar of the security measures firewalls use… To effectively monitor IoT breaches one must look at the ingress and egress traffic of a network!
- Memory-Resident Malware
Memory-resident malware loads its code into the memory space of either a system process or file. The malware stays there in limbo until it’s triggered. That’s bad enough. But memory-resident malware can also be used to trigger zero-day attacks, in which hacker’s plan attacks before or on the day when a vulnerability is publicly reported, making them almost impossible to prevent.
Although there is a very easy way to wipe out this type of malware, simply reboot the infected system. But with most PCs more stable than ever, users run their machines longer and not performing regular reboots!
- Having enough personnel…
In-house security operations centers (SOCs) may sound like a good protective measure. But in fact, many are playing a dangerous game of catch-up.
A recent report from McAfee finds that one in four SOCs are reactive rather than proactive. The survey also found that most SOCs use ad-hoc triage procedures and nearly all are overwhelmed by the sheer number of daily alerts.
Rather than trying to do it all on your own, many IT departments are turning to managed security services.
At DisruptiveTek, we have the highest Gartner ranked partners in the industry, providing our customers with 24×7/365 managed SOC’s helping our customers to alleviate the false positive of security alerts taking up your IT Departments time! Learn more on how you can leverage and augment your systems to protect your infrastructure and valuable information!