Connect with us
CCW 2024

Cyber Security

Cybercriminals Narrow Their Focus on SMBs: Acronis

Published

on

A Mid-year Cyberthreats Report 2021 by global cyber protection leader Acronis, warns that small and medium-sized businesses (SMBs) are at particular risk based on the attack trends seen during the first six months of the year. Released at Black Hat 2021 event, where Acronis was a Diamond sponsor, the report is an in-depth review of the cyber threat trends the company’s experts are tracking.

The report revealed that during the first half of 2021, 4 out of 5 organizations experienced a cybersecurity breach originating from a vulnerability in their third-party vendor ecosystem. That’s at a time when the average cost of a data breach rose to around $3.56 million, with the average ransomware payment jumping 33% to more than $100,000. While that represents a major financial hit to any organization, those amounts would sound the death-knell for most SMBs, which Acronis believes is a major concern for the second half of 2021.

“While the increase in attacks affects organizations of all sizes, something that’s under-reported in the coverage of current cyber threat trends is the impact on the small business community,” explained Candid Wüest, Acronis VP of Cyber Protection Research. “Unlike larger corporations, small and medium-sized companies don’t have the money, resources, or staffing expertise needed to counter today’s threats. That’s why they turn to IT service providers – but if those service providers are compromised, those SMBs are at the mercy of the attackers.”

By utilizing supply-chain attacks against managed service providers (MSPs), attackers gain access to both the MSP business and all of its clients. As seen in the SolarWinds breach last year and the Kaseya VSA attack earlier in 2021, one successful attack means they can breach hundreds or thousands of SMBs downstream. At Black Hat 2021, Wüest will provide an in-depth look at how supply-chain attacks against IT service providers pose a particular threat to SMBs in a session titled Ransomware Attacks Against MSPs – A Nightmare for SMBs.

Additional takeaways at the mid-year mark
Beyond the high-profile attacks that have dominated the headlines during the past six months and the concerns raised about the impact on MSPs and small businesses, the report also noted:

  • Phishing attacks are rampant. Using social engineering techniques to trick unwary users into clicking malicious attachments or links, phishing emails rose 62% from Q1 to Q2. That spike is of particular concern since 94% of malware is delivered by email. During the same period, Acronis blocked more than 393,000 phishing and malicious URLs for clients, preventing attackers from accessing valuable data and injecting malware into the client’s system.
  • Data exfiltration continues to increase. In 2020, more than 1,300 victims of ransomware had their data publicly leaked following an attack, as cybercriminals look to maximize the financial gain from successful incidents. During the first half of 2021, more than 1,100 data leaks have already been published – which projects a 70% increase for the year.
  • Remote workers continue to be a prime target. The reliance on remote workers continues in the wake of the COVID-19 pandemic. Two-thirds of remote workers now use work devices for personal tasks and use personal home devices for business activities. As a result, attackers have been actively probing remote workers. Acronis observed more than twice the number of global cyberattacks, with a 300% increase in brute-force attacks against remote machines via RDP.

Creating the Cyberthreats Report Mid-year 2021
The Cyberthreats Report Mid-year 2021 is based on examining attack and threat data collected by the company’s global network of Acronis CPOCs, which monitor and research cyber threats 24/7. Malware data was collected by more than 250,000 unique endpoints around the world running Acronis Cyber Protect (either as a client of an MSP using Acronis Cyber Protect Cloud or a business running Acronis Cyber Protect 15). The mid-year update covers attacks targeting endpoints detected between January and June 2021.

The full report provides in-depth insights into the top security/threat trends the CPOCs observed during the first half of 2021, a review of malware families and related statistics, a deep dive into ransomware’s most dangerous groups, the vulnerabilities that contribute to successful attacks, and Acronis’ security recommendations for the remainder of 2021 and beyond.

Cyber Security

Check Point Software Technologies to Participate at GISEC 2024

Published

on

Check Point Software Technologies has announced its participation at the Gulf Information Security Expo & Conference (GISEC) 2024, scheduled from April 23rd to April 25th, 2024, at the Dubai World Trade Centre. As cyber threats continue to evolve rapidly, the need for advanced cybersecurity solutions has never been more pressing. With the United Arab Emirates experiencing an average of 1,207 cyberattacks per organization each week over the last six months—surpassing the global average—Check Point Software is set to showcase its flagship Check Point Infinity Platform at GISEC 2024.

This platform, which is at the forefront of AI-powered, cloud-delivered cybersecurity, has been specifically designed to meet the modern challenges of an evolving threat landscape, providing comprehensive protection, consolidated operations, and collaborative communication capabilities. Visitors can explore these solutions at booth #C39 in Hall 7, where the following highlights will be featured:

  1. Check Point Infinity Playblocks: Automatically triggers preventive actions upon detecting an attack, swiftly containing threats through a consolidated, cloud-based security platform.
  2. Check Point Infinity AI Copilot: Enhances the efficiency of security teams by leveraging AI to automate complex tasks and deliver proactive security solutions.
  3. Check Point UAE Infinity Portal: Tailored to meet the needs of organizations of all sizes while fully adhering to the UAE’s data privacy regulations.

Ram Narayanan, Country Manager at Check Point Software Technologies Middle East, commented, “Our participation at GISEC 2024 underscores our commitment to bolstering cybersecurity defences in the region. The Check Point Infinity Platform, with its AI-powered threat prevention and cloud-delivered threat intelligence, is critical for organizations needing robust solutions to protect their assets. We look forward to engaging with customers and partners to discuss how these innovations can enhance cybersecurity resilience.”

Additionally, at GISEC 2024, Check Point Software will focus on strengthening relationships with customers and partners. This commitment highlights the company’s ongoing effort to provide advanced cybersecurity solutions in the region. Check Point Software is eager to meet with attendees, discuss their security challenges, and explore how it can help organizations enhance their defences, prevent cyber-attacks, and protect their critical assets.

Continue Reading

Cyber Security

Milestone Systems Releases Thought Paper on Cybersecurity for Video Technology

Published

on

Milestone Systems has published a comprehensive thought paper addressing the critical need for robust cybersecurity measures in video technology solutions. The paper titled “Cybersecurity for video technology: Understanding and countering cyber threats” delves into the complexities of cybersecurity in video surveillance, offering invaluable insights and strategies to fortify organisations against cyber threats.
Cyber threats pose a significant risk to video technology solutions in today’s digital age, as evidenced by high-profile breaches.

The thought paper underscores the urgency of prioritising cybersecurity and provides a roadmap for technology decision-makers to navigate this evolving landscape effectively. It also dives into crucial aspects of cybersecurity precautions, providing insights into essential concepts for companies to ensure robust protection against cyber threats.

Below are some key takeaways from the thought paper:
Understanding the Cyber Kill Chain: Identifying the Cyber Kill Chain offers organisations a systematic approach to understanding and mitigating cyber threats. Breaking down attacks into seven stages makes it clear where proactive defences can be deployed to minimise the risk of breaches.

Protecting IP-Network Video Cameras: The paper recognises vulnerabilities in IP-network video cameras and emphasises the importance of implementing strong security measures. Measures such as robust authentication protocols and regular firmware updates are vital in fortifying defences against potential risks.

Securing Video Management Software (VMS): Highlighting the significance of securing Video Management Software (VMS), the paper advocates for proactive strategies like penetration testing and engaging ethical hackers. These measures bolster security and ensure resilience against potential threats.

Responsibility for Cybersecurity: The paper distinguishes between the responsibilities of on-premises and cloud solutions and underscores the necessity of technical proficiency and transparent communication. By understanding their roles, organisations can effectively manage cybersecurity risks.

Openness and Transparency: The paper stresses the importance of openness and transparency in addressing cybersecurity vulnerabilities. By openly acknowledging weaknesses, vendors empower customers to take proactive measures, foster collaboration, and enhance the overall cybersecurity posture.

Addressing the Human Factor: Acknowledging the human element as a potential weak link in security, the paper emphasises the importance of education, training, and balancing security and usability. Prioritising human-centric security practices enhances overall cybersecurity resilience.

Commenting on the release of the thought paper, Jos Beernink, VP of EMEA at Milestone Systems, stated, “In an era where cyber threats loom large, safeguarding your video technology against potential breaches is paramount. Our thought paper is a useful guide for organisations to navigate the complex cybersecurity landscape effectively. By implementing the strategies outlined in the paper, organisations can strengthen their defences and mitigate the risk of cyberattacks.”

Continue Reading

Cyber Security

Sophos Partners with Tenable to Launch New Sophos Managed Risk Service

Published

on

Sophos has announced a strategic partnership with Tenable, to provide Sophos Managed Risk, a worldwide vulnerability and attack surface management service. The new service features a dedicated Sophos team that leverages Tenable’s exposure management technology and collaborates with the security operations experts from Sophos Managed Detection and Response (MDR) to provide attack surface visibility, continuous risk monitoring, vulnerability prioritization, investigation, and proactive notification designed to prevent cyberattacks.

The modern attack surface has expanded beyond traditional on-premises IT boundaries, with organizations operating frequently unknown numbers of external and internet-facing assets that are unpatched or under-protected, leaving them vulnerable to cyberattackers. This is evident in the newest Sophos Active Adversary Report, which identifies three tasks that organisations must prioritize to minimize the risk of brazen intrusions that lead to ransomware or other types of attacks. These include closing exposed Remote Desktop Protocol (RDP) access, enabling multi-factor authorization and patching vulnerable servers, all of which were top entry points in breaches handled by Sophos Incident Response in 2023. The Sophos Managed Risk service can assess an organization’s external attack surface, prioritize the riskiest exposures, such as open RDP, and provide tailored remediation guidance to help eliminate blind spots and stay ahead of potentially devastating attacks.

“Sophos and Tenable are two industry security leaders coming together to address urgent, pervasive security challenges that organizations continuously struggle to control. We can now help organisations identify and prioritize the remediation of vulnerabilities in external assets, devices and software that are often overlooked. Organisations must manage these exposure risks, because unattended, they only lead to more costly and time-consuming issues and are often the root causes of significant breaches,” said Rob Harrison, senior vice president for endpoint and security operations product management at Sophos. “We know from Sophos’ worldwide survey data that 32% of ransomware attacks start with an unpatched vulnerability and that these attacks are the most expensive to remediate. The ideal security layers to prevent these issues include an active approach to improving security postures by minimizing the chances of a breach with Sophos Managed Risk, Sophos Endpoint, and 24×7 Sophos MDR coverage.”

“While the latest zero-day may dominate the headlines, the biggest threat to organizations, by a large margin, is still known vulnerabilities – or vulnerabilities for which patches are readily available,” said Greg Goetz, vice president of global strategic partners and MSSP, Tenable. “A winning approach includes risk-based prioritization with context-driven analytics to proactively address exposures before they become a problem. Sophos Managed Risk, powered by the Tenable One Exposure Management Platform, delivers outsourced preventive risk management, enabling organizations to anticipate attacks and reduce cyber risk.”

Sophos Managed Risk is available as an extended service with Sophos MDR, which already protects more than 21,000 organizations globally. The Sophos Managed Risk team is Tenable-certified and works closely with Sophos MDR to share essential information about zero-days, known vulnerabilities and exposure risks to assess and investigate possibly exploited environments.

“Organizations benefit through regular interaction, including scheduled meetings with Sophos experts to review recent discoveries, insights into the current threat landscape, and recommendations for remediation and prioritizing actions. Additionally, organizations can initiate inquiries via the Sophos Central platform, allowing users to directly engage with the Sophos Managed Risk team for tailored support, and reports and to review their latest prioritized alerts,” the company said.

Sophos Managed Risk is available with a term license through Sophos’ global network of channel partners and Managed Service Providers (MSPs). A Sophos MSP Flex version will be available in 2024.

Continue Reading
Advertisement CCW 2024

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.