Connect with us

Featured

Ransomware as a Service (RaaS) Models Have Evolved During the Past Years

Published

on

Emad Fahmy, the Systems Engineering Manager for the Middle East at Netscout, speaks about the evolving threat landscape in the region

How has the security threat landscape evolved over the past few months?
Pandemic-driven work-from-home policies are likely to persist well into 2021, and for many, remote work will become a permanent change for a growing portion of the global workforce. This shift has caused a lot of turbulence throughout the global threat landscape, as threat actors have taken advantage of the vulnerabilities that have surfaced by the pandemic as they target these weak spots.

Cybercriminals have stepped up their efforts, launching a record number of distributed denial of service (DDoS) attacks, with 83% of enterprises worldwide falling victim to these, and other cyber incursions globally. Many organizations require new tactics and strategies as their traditional cybersecurity methods need to be reassessed in the face of a distributed work infrastructure. This is only expected to continue throughout the industry for 2021 and onwards. Additionally, more investments are being made in the Internet Service Provider (ISP) edge, making security threats an even larger challenge to overcome. Companies need to consider fortifying their cybersecurity solutions to protect the remote workers and the data shared between them.

What sort of security challenges are people facing when working from home and how is your company equipped to handle those challenges?
The sudden shift to remote work has left companies unprepared for the possible cybersecurity threats. According to the findings from our 2020 Threat Intelligence Report, home networks are at a larger risk of being targets of brute-force attacks, as most home networks do not have the same enterprise-grade security control implemented in offices. Additionally, home networks are used by multiple individuals, which could also include children who are more likely to invite unrecognized apps and potential threats alongside the use of vulnerable IoT devices, jeopardizing others using the same consumer network.

Another security challenge is the use of personal devices, to access corporate documents. These devices could already be compromised or shared by the employee with family members or friends, making it more difficult to monitor its usage and the cybersecurity precautions required. This can expose the company’s network to threats directed at the employees’ IoT devices. These devices are more mobile therefore can be used on unsecured networks or public Wi-Fi, increasing the risk for unwanted users gaining entry and access to the company’s confidential files.

How has ransomware evolved during the pandemic period and what are you doing to tackle the problem?
78% of enterprises have been infected by ransomware in the UAE alone, a drastic increase from the pre-pandemic security threat landscape. The past year gave threat actors the resources, time, and perfect opportunity to refine their techniques, making ransomware attacks more complex and sophisticated than ever before.

Ransomware threat actors have initiated attacks worth millions of dollars as large companies were increasingly targeted through abusing the current work landscape and the lack of preparation of companies facing a new wave of digitalization which the need for online business continuity has brought on. The pandemic has caused the rise of new variants which are being sold on Ransomware as a Service (RaaS) models, making it much easier for cyber criminals to initiate attacks.

How can companies overcome digital security and privacy challenges?
With an ever-expanding and evolving cybersecurity threat landscape, it is becoming increasingly difficult for companies to protect their digital footprint and ensure their data privacy. To do this, past methods of facing these threats need to be left where they belong, in the past. Companies need to be aware that advanced malware, which is not easily detectable by traditional defenses, is no longer the biggest risk for companies. A bigger threat has come along pushing aside individual bad actors, as more and more organized crime syndicates and state sponsored cyberterrorism arises. These threats are more sophisticated and complex, causing network and security teams a larger challenge than before.

A few important things that companies and ISPs alike need to understand are the importance of visibility, DDoS detection, threat intelligence and mitigation, automation and service enablement when considering their cybersecurity solutions. At NETSCOUT, these factors are key as we believe that the best way to handle cybersecurity threat is to eliminate them before they come. The way it works is like the COVID-19 vaccine. It does not claim to stop the risk of being exposed to the virus, however it does eliminate the dangers of the symptoms. It is all about prevention rather than trying to cure the disease once damage has already been done.

Do you believe companies today have accelerated their digital transformation initiatives?
The world is headed towards a digital future. We might not be at the stage predicted in 90s movies, with flying cars and hoverboards. Still, we are surely reaching a point where companies actively move towards having completely digitalized processes and operations. This change had already started years back however, with the pandemic serving as a harsh wake up call to companies. This reality was thrust upon businesses rather than the latter consciously choosing this cyber evolution however that has been accompanied by significant benefits such as the flexibility of workforces and an increased sense of confidence in the ability of the world to move forward when facing unexpected challenges.

Expert Speak

Level up Your IT Security: All About Insider Threats

Published

on

What do a disgruntled former employee and a vindictive associate with access to an organization’s critical data have in common? They are both high-risk insider threats. Although any cyberattack can be difficult to detect, it is especially difficult to spot insider threats. To avoid the brunt of these attacks, it is imperative to know what signs indicate an insider threat and use this to develop a security model that can defend your organization against these threats.

Despite insider threats being one of the top threats to organizations, traditional cybersecurity strategies seldom focus on them. This makes it harder for organizations to understand insider threats and mitigate them. As insider threats can also be a result of accidental misuse, it is crucial to understand the causes and effects of these threats. To mitigate the risks, organizations can implement a few helpful measures.

Protect the organization’s critical assets
Take inventory of all the critical assets in the organization, including intellectual property, information on internal processes, and customer data. This helps you plan, allocate, and revoke privileged access, ensuring that only the right users have access for the right amount of time.

Deploy solutions that can track employee activity around the clock
Collecting logs from employees’ devices helps you analyze employee activity and identify suspicious behavior. For instance, if there is any unusual activity, such as signing in to the network at 3 am or transferring large amounts of data over the network, it will be logged under suspicious activities. This helps you identify and mitigate insider threats effectively.

Enforce strict data protection policies across the organization
Document privacy and privilege management policies for your organization and educate employees about them. Organizations must maintain records of signed copies of employee acknowledgment forms stating that the employees have read and understood those policies.

Use insider threat detection software
ManageEngine ADAudit Plus leverages user behavior analytics to identify insider threats. It monitors privileged users, detects anomalies, and provides visibility into user activity, helping organizations detect every type of insider attack.

Because the repercussions of insider attacks can be disastrous for organizations in terms of financial and reputational losses, organizations must implement effective IT management solutions to identify and mitigate insider threats.

Continue Reading

Cyber Security

Dubai Future Foundation Launch Report on Cyber Risk Scenarios in Banking and Finance

Published

on

Dubai Future Foundation (DFF), in partnership with the Future Foresight and Decision-Making Support Center at Dubai Police, launched its latest report titled ‘Banking and Financial Services Sector Scenarios of Risks and Resilience’, which examines the risks of cybercrime and the potential implications for the banking and finance sector in Dubai.

The publication is part of DFF’s ‘The Digitisation of Critical Infrastructure’ series that examines several sectors related to critical infrastructure, including energy, water, systems, transport, agriculture, telecommunications, healthcare, food, banking and finance, and emergency services. Disruption to these services, on any level, may have a serious effect on the national economy, public health, safety and the welfare of the community.

In his remarks, His Excellency Lieutenant General Abdullah Khalifa Al Marri, Commander-in-Chief of Dubai Police, said: “The world is witnessing a remarkable growth in the reliance on digital solutions, especially in the financial sector, and any threat to financial infrastructure may lead to an imbalance in the economic and social system. Therefore, cooperation between the private and public sectors is a pre-requisite for combating cybercrime.”

He praised the constructive collaboration between the Future Foresight and Decision-Making Support Center at Dubai Police and DFF as a prime example of aligning efforts between various entities in the emirate to address potential threats to social security.

Highlighting the role of the Foundation in enriching future knowledge on diverse sectors in Dubai and the wider UAE, Khalfan Belhoul, CEO of DFF, said: “This series of reports coincides with cyberattacks that has risen in many parts of the world and pose a serious danger to communities and organizations today in light of the widespread adoption of advanced technology and accelerated digital transformation across the board.”

He added: “Our partnership with Dubai Police supports the vision of the wise UAE leadership for solidifying governmental partnerships aiming to benefit entities recognize opportunities, which enables them to tackle future challenges.”

Dubai is one of the global pioneers in leveraging advanced technology to improve wellbeing. The emirate has already digitalized most of its public services, from issuing residency visas to paying parking fees.

The report illustrates how the ongoing digitalization increases the rising risk of cyberattacks. The global cybersecurity market is predicted to surge from US$167.1 billion in 2019, to US$248.26 billion by 2023, attaining a 10.4 percent compound annual growth rate (CAGR).

In 2019, Dubai ranked eighth among the world’s financial leaders. With the largest banking industry in the GCC region, the UAE is home to nearly one-third of the region’s banking assets.

Continue Reading

Featured

Digitization is a Priority for Many Business Leaders

Published

on

Niranjan Gidwani, Consultant Director, Member of UAE Superbrands Council, and Former CEO of Eros Group, speaks about the security threat landscape in the region

How has the security threat landscape evolved over the past few months?
Cybersecurity threats are continuously evolving. Cybersecurity threats are not only damaging individuals, organisations, and governments financially, but also causing serious damage to reputation. These threats are seriously impacting the delivery of critical services, and many businesses are failing, or putting in grossly inadequate resources to protect themselves from potential losses. Mainly because cybersecurity threats and data leakages are still not a part of most organisations’ strategic plans.

What sort of security challenges are people facing when working from home and how is your company equipped to handle those challenges?
Serious challenges are a very strong likelihood of data leakage, information sharing, data thefts, business secrets, billing, and pricing information, downloading of sensitive data, customer data. Also downloads of objectionable material, and so on, on official laptops.

Our organization has done the following:

  1. Data loss prevention policy in place.
  2. Device data encryption policy in place.
  3. Usage of VPN-based connectivity.
  4. Continuous monitoring of suspicious user activities.
  5. Robust infrastructure and proper security policies in place.

How has ransomware evolved during the pandemic period and what are you doing to tackle the problem?
Yes, ransomware has increased a lot during the pandemic because organizations have become more vulnerable. Hackers are taking advantage as businesses and individuals are distracted by many more issues during the pandemic. Hackers who commit cyber-attacks know that many will be able to get what they want.

We have to constantly be more vigilant, and take more proactive actions like frequent training of staff associated with handling cybersecurity issues. Also, to periodically check the integrity of such staff, as that could become the weak link. Tighten all open ports (loose links) in network security. Get frequent network and device security audits from a third party. More important is, once such audit reports are received, review the same immediately, and take immediate action on recommendations and investments.

How can companies overcome digital security and privacy challenges?
By encryption of all device’s data. Run end-to-end Security, Network security test assessments like VAPT (Vulnerability Assessment and Penetration Testing) every six months. Remove all redundant data from various devices.

Increase budget and time in implementing cybersecurity advice. Hire trained and highly ethical staff for monitoring potential loss due to digital security. Regular reviews to see that policies and procedures are in place, and working.

Do you believe companies today have accelerated their digital transformation initiatives?
Yes, companies today have accelerated their digital transformation initiatives as compared to previous years. Organizations are using a step-by-step approach to digital transformation. At the same time, it would be interesting to quote a study that also says that most companies are using technology to modernize their existing business model rather than transforming it.

Although 87 percent of senior business leaders say that digitization is a company priority, only 40 percent of organizations have brought digital initiatives to scale. And most business leaders make the mistake of confusing digitization, which is not the same as digital transformation, which is far more strategic.
For 39 percent of CIOs, digital transformation and cybersecurity is the most important task given to them by their CEO. (IDG)

What are the Cybersecurity Trends for 2021?
Data Security would be the number one issue, as, during the pandemic, lots of people have started working from home. Even teachers and students are engaged in remote teaching and studying. An increase in access to personal data carries the risk of destabilizing the digital society. There seems to be an overload of data being collected globally by a multitude of agencies/organisations/governments/licensing authorities/property developers/aggregators, all of which increase risk significantly.

Personal computers, Mobile, IOT, and smart consumer devices security issues as there is a multifold increase in the use of wearables and home/office automation products. Millions of IoT devices are open to the risk of remote code execution (RCE) attacks. Vehicles and transport infrastructure, health and medical infrastructure are new targets for cyber attacks as hackers are targeting smart supply chains. Cloud security since more business processes, infrastructure, and data are moving towards the cloud.

What are the key factors to consider making sure the digital economies of today are secured?
Heavy, and frequently monitored investments in Cybersecurity. Adoption of advanced technologies, robust infrastructure, and architecture. Professionally trained professionals to build a secure and innovative platform. Last but the most important – finally, even the most sophisticated digitization and digital transformation are created by people. Therefore, ensuring by whatever means available, the ethics and integrity of people associated with such initiatives. Because, it is the same highly intelligent minds who also find ways to counter and break into, or steal all good initiatives. Ethics and integrity or lack of it make that difference.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.