Despite technological advances in the cybersecurity world, evolving cyber-risks and complicated threats abound – and that’s not just a qualitative statement.
These figures presented by CSO Online (March 2020) speak for themselves:
- 63% of companies said their data was potentially compromised within the last 12 months due to a hardware or silicon-level security breach
- 94% of malware was delivered via email
- Phishing attacks account for more than 80% of reported security incidents
- 60% of breaches involved vulnerabilities for which a patch was available but not applied
- Data breaches cost enterprises an average of $3.92 million
Cybersecurity-related incidents were clearly rampant throughout 2020, and that’s not expected to change in the coming years.
Though by no means an exhaustive list, here are some of the cybersecurity threats and trends that made an imprint on the cybersecurity landscape this year.
1. Social Engineering or Phishing Attacks
On July 15th 2020, accounts of high profile users (e.g. Elon Musk, Bill Gates, Kanye West, Joseph R. Biden Jr., Former President Barack Obama, etc.) of the microblogging platform, Twitter, were compromised and used to fraudulently tweet about bitcoin. The tweets requested the followers of these accounts to send bitcoin to an address, falsely promising to return double the amount. This hack netted the criminals more than $100,000 in bitcoin – despite the tweets being live for only a short amount of time.
According to reports, the hackers “used a phone spear phishing attack to obtain the credentials of Twitter employees who had access to internal support systems and tools.”
Phishing methods are increasingly becoming more sophisticated and realistic. As the Twitter incident highlights, it only takes a handful of individuals (if not just one person) to compromise an entire organisation.
2. Data Breaches
Marriott suffered yet another data breach in January of 2020. The hotel chain disclosed that personal identifiable information of approximately 5.2 million hotel guests were accessed. The information included names, addresses, phone numbers, birth dates, and airline loyalty information. These were accessed using the log-in credentials of employees at a franchised property.
In another data server breach incident, the personal information of more than 10.6 million guests of MGM Resorts properties was disseminated on a hacking forum in February of this year. This included full names, addresses, phone numbers, birth dates, and email addresses of hotel guests, including high profile individuals, reporters, government officials, and FBI agents. The company now faces a class action lawsuit because of this breach.
The implications of data breaches can’t be trivialised. Apart from hefty financial consequences, there is longer-term reputational damage to contend with, such as the loss of credibility and trust in the organisation.
In October 2020, Software AG, the second-largest software vendor in Germany and the seventh-largest in Europe, suffered a Clop ransomware attack. (The attack encrypts targeted files and makes them inaccessible – usually until ransom payments are made). It crippled part of its internal network and compromised employee information. The cybercriminals demanded a $23 million ransom. It was reported that the company tried to negotiate with the hackers, but their efforts were unsuccessful.
Finastra, a $1.9 billion revenue firm providing software solutions to financial institutions worldwide (including 90 of the top 100 global banks), was hit by a ransomware attack that disrupted their operations, requiring them to disconnect impacted servers from the Internet. Cybersecurity experts have suggested that Finestra was a target because of their history of issues relating to outdated security practices and equipment. Other firms that were the targets of ransomware attacks include the Chicago-based leading global legal firm, Seyforth Shaw LLP, and Carnival Corporation, the world’s largest cruise line operator.
The prevalence of ransomware attacks requires that servers, systems, and security processes always remain up-to-date. Off-network backups should be considered as part of cybersecurity and cyber-risk strategies as well.
Deepfakes have become increasingly popular over this past year. A deepfake, as defined by this article, is “a type of artificial intelligence used to create convincing images, audio and video hoaxes. The term, which describes both the technology and the resulting bogus content, is a portmanteau of deep learning and fake.”
The targets of these AI-doctored videos are usually celebrities and politicians and they can (and have been) used to deliver messages for nefarious purposes.
Security experts state that deepfakes will eventually victimise organisations and companies. It will be adopted by cybercriminals to impersonate members of organisations to obtain access to critical business information. It will eventually evolve to become a sophisticated method of phishing.
Deep fakes can also be used to commit fraud, as hackers and criminals “create fake versions of real companies to lure in customers.”
5. Internet of Things (IoT) Devices
The popularity and infancy of the security technology of IoT devices (which range from smart security systems to voice assistants and home appliances) have made it a viable target for cybercriminals. IoT devices are not only being widely used in households, but in business organisations as well.Microsoft and other tech giants have highlighted attacks where IoT devices were used as an entry point to exploit secure network access (via printers, VoIP systems, and other devices).
The amount of confidential, personal, and/or business information that passes through these devices have made it attractive for cyber exploits.
6. Pandemic-Related Exploits
Cybercriminals decided to capitalise on widespread distress around COVID-19. The World Health Organisation (WHO) has warned about hackers and scammers who impersonate the organisation. They send out emails and WhatsApp messages with malicious links or attachments pertaining to COVID-19.
This article also states that there have been incidents when employees clicked on fake emails pertaining to intercompany COVID-19 testing information. With a click, systems were compromised.
This threat will likely continue into 2021, as hackers exploit the public’s interest in vaccines.
1. Cyber Insurance
With the complex security threats mentioned above, companies have turned to cyber insurance to manage cyber security risks. According to the Cyber Insurance Market Research Report (June 2020), the industry is expected to reach $70.7 billion by 2030, up from $5.6 billion in 2019. The primary growth drivers of the market are digitisation and the increasing occurrences of data breaches. From January 2019 to April 2020 alone, an estimated 8 billion records (including credit card numbers, phone numbers, and home addresses) have been exposed in data breaches.
2. Alternative Authentication
Cybercriminals continue to use advanced technologies to crack passwords. Given the number of cyber crimes associated with leaked or compromised passwords, passwordless authentication will continue to gain traction.
These types of alternative authentication methods include: biometric authentication, hardware tokens, unique password tokens, and knowledge-based authentications.
3. Cloud-Based Security Services
The progressive migration of technology infrastructure to the cloud has spurred the need for cloud-based security services. The largest industry to avail of cloud-based security services has been the banking and financial services industry.
According to Persistence Market Research, the global public cloud management and security services market is expected to grow to $26.41 billion by the end of 2022.
Cloud-based security is believed to offer several advantages, such as improved protection performance, high and increased threat intelligence, and greater, quicker compliance with industry and government security regulations and standards.
4. Artificial Intelligence
The cybersecurity industry, as expected, leveraged AI to counter ever evolving threats.
Antivirus will continue to make use of machine learning to perform tasks such as the scanning of emails to identify social engineering or phishing attacks, the automation of network data analysis to ensure continuous monitoring, or the identification of applications or programs exhibiting unusual behaviour.
In conclusion, the cybersecurity threats and complicated risks attacking organisations from different directions prompted a writer to describe the Internet of today as the “digital wild west.” There is no indication that these threats will be any less intense in 2021 – or beyond.
Practicing strong digital hygiene alongside adopting a “security-first” mindset can no longer be an afterthought. Today’s cyber-risk strategies must revolve around a lesson learned in the past year: organisations cannot afford to let their guard down.
How Praxonomy Can Help
Cybersecurity begins at the top. Given the amount of highly sensitive information that flows to and fro the directors, the board cannot afford to be the weakest link when it comes to security affairs.
To protect the board against security-related incidents, boards should consider the use of a board portal such as Praxonomy.
Praxonomy provides a centralised and secure platform for board administrators, executives and directors to organise and manage board and committee meetings, access documents, communicate and execute their governance responsibilities.
It offers security features such as granular permission controls, user roles and advanced data encryption platform. Praxonomy is ISO 27001 certified and GDPR compliant, and client data is solely hosted in secure data centres in the E.U..
For more information, schedule a demo today.