Rant

5 Cyber Threats That Have Become Part of the New Reality

By  | 

Cyber Threats

When dramatic changes occur in our lives, they affect all aspects of life. Avalanche-like, clinging to each other, changes pass through our lives, often staying with us forever. And 2020 was no exception, bringing us a new reality and pushing us to the changes we wanted or not, for which we were preparing or not, but what they are now is a fact.

Why did this happen? There are a number of reasons why it happened. One of the first is to transfer employees to remote work. If not all giants have decided on this step yet, due to the conservatism of the whole system or managers, the smaller companies, on the contrary, have accepted the new conditions, seeing in it new opportunities, new options.

The next reason is an increase in the use of online services. Unexpectedly, it turned out to be very convenient to order goods, food, tools, components through the Internet. Not only is it convenient – a couple of clicks and that’s it, but also the delivery points are nearby, there is no need to go far. The only thing is that with clothes it does not always work well, but with all other categories of goods perfectly.

The economic downturn that has occurred and the increased burden on health care have been very high, many times greater than in previous declines and epidemics. Because of this, literally every industry was under attack. All this together could not leave the cheaters aside, but on the contrary, gave them a new space for creativity.

So, the first threat that has grown in the pandemic is the threat of using social engineering. The number of phishing letters has tripled, and the total number of different attacks has increased by a quarter. Fraudsters use fear of coronavirus, lack of money, are covered by the government. All in order to deceive you and force you to enter your data, give you access to your account or force you to download malicious software.

And we’ve said more than once (and not just us) that many employees are not familiar with digital hygiene, that they do not know the value of the information they work with. And now they’re also working remotely, making it harder to keep track of them. That’s why it’s important to learn and follow the rules of digital hygiene. And that’s why employee monitoring software is important – they help you monitor whether or not an employee is complying with digital safety regulations.

Hence the second problem – the increase in the number of internal threats. Internal threats – when employees abuse access to corporate resources to gain benefit and/or harm the company. For what reasons – we’ll never know if we have no employee monitoring. And there can be many reasons – from simple dissatisfaction with the work, colleagues, or bosses, to lack of money due to a difficult life situation. That doesn’t mean we automatically suspect everyone; we just get a tool that helps us prevent conflicts and thus their devastating consequences. It also allows us to monitor the mental health of our team and help those employees who need help.

The third problem is extortion programs that encrypt important data and require money (and a lot of money) to return access to this data. First, due to the use of home networks and less secure home workstations, the number of attacks with such programs has increased. Second, due to the fact that people on their home computers are more likely to store personal and more important data, the number of payments to extortioners has increased by a third. Thus, running a file from a dubious letter, or an open link leading somewhere unclear, can deprive you of both personal and corporate data.

The fourth problem was data leakage. When an intruder either receives data from an unhappy user or accesses the user’s system. But you can do a lot of things with the obtained data – for example, sell it to competitors, if it’s a list of clients. And it’s not always the employee’s fault – in terms of malice – but only his illiteracy or credulity.

Finally, it closes our top five account hijacking threats. If anyone logs into your account, they will get full access to your data. The system can’t recognize who’s sitting at your computer, so it has to trust everyone who knows the login and password. That’s why it’s very important to be careful not to enter your data wherever you go and not to tell anyone you’re not sure about. And with two-factor authentication configured, you can protect yourself and know in time that your account has been compromised.

Practice shows that in most cases, illiteracy and inattention of employees are largely to blame and, first of all, to improve the security of corporate systems and data (or personal) must teach employees the rules of digital hygiene, then you can protect yourself from many attacks.

Loading...

You must be logged in to post a comment Login