Data is the DNA of any business or organization. And your data – whether it’s research and development, payroll information, client payment details, or any other mission-critical information – is up for grabs by cybercriminals who want nothing more than to sell stolen data on the dark web.
Have you received what looks like a very legitimate email suggesting you need to upgrade your Microsoft 365 account? Maybe the IRS sent you a notification regarding a “critical alert” via email? If so, do not engage! A new wave of phishing attacks is trying to get users to respond to fake emails that could easily infect your computer with a virus that can compromise your passwords.
Now that we are a few months into 2018, security analysts are able to look back on 2017 and analyze leading cybersecurity trends. Not surprisingly, according to the Cisco 2018 Annual Cybersecurity report, there was an elevenfold increase in malware last year.
“Adversaries are becoming more adept at evasion— and weaponizing cloud services and other technology used for legitimate purposes,” the report declares.
The following are some of the major cybersecurity trends of 2017:
Ransomware Families Up 32%, Total Ransomware Threats Down 41%
According to Dark Reading, the growth in ransomware attacks hit a plateau, while the number of ransomware families rose considerably. As cybercriminals become more adept in targeting individuals and organizations, the variety of ransomware attacks are evolving. Not surprisingly, the WannaCry variant dominated the landscape – making up 57% of all ransomware detected last year.
In 2017, the world saw the rise of ransomware as the names of famous ransomware attacks permeated the news such as Petya, Goldeneye and more. According to Secplicity, “…malware is at an all-time high, global ransomware damages are predicted to exceed $5 billion, and data records are being stolen by hackers at a rate of more than 5 million a day.”
Recent complex vulnerabilities in top-tier computer devices, iPhones, Windows PCs, Android devices and other gadgets have sent companies and individuals alike in a tailspin. A critical security flaw has been detected in processor chips that allow bottom barrel IT processes to have access to memory in the computer’s kernel – aka the most privileged IT process of the device.
Hackers could potentially exploit this issue giving them a clear path for installing malicious software to read memory through this new group of side-channel attacks and putting data, hardware and software at serious risk.
Here are the immediate steps you need to take to make sure your data and infrastructure are protected:
Shadow IT and Shadow Data: How Organizations Can Protect Against the Use of Unsanctioned Applications
When we think of cybercrimes we often think of criminals hacking into a network to retrieve sensitive corporate information. But cyberattacks and the leaking of information can also occur from within an organization in the form of Shadow IT and Shadow Data.
What is the Dark Web and Why Should Organizations Care: DiamondIT Announces New Services to Detect Compromised Credentials on Dark Web
The virtual world of the World Wide Web is a vast space that, like the real world, contains both good and bad. While Google, Facebook, Amazon and all other online services have brought so many enhancements and innovation to our lives, there is also a place called “the Dark Web.”