Top Cyber Threats in 2020

2020 CYBER THREATS

Cyber Threats in 2020Here are the top cyber threats are for 2020 and how to best protect your organisation from attacks.

While Phishing, Ransomware, Crypto-Jacking and IoT Vulnerabilities have been prominent in 2019, here are the trending threats and vulnerabilities for 2020: Business Email Compromises, Credential Stuffing, and Web Application Attacks.

Below you will also find recommendations for mitigating the risks associated with these threats and vulnerabilities to better protect your organization from cyber attacks.

 BUSINESS EMAIL COMPROMISE (BEC)

What is BEC?

Cyber-enabled financial fraud or Business Email Compromise (BEC) attacks involve fraudulent requests to pay invoices, change banking information, buy gift cards, or other actions that result in payments being directed to attackers. Often impersonating high-level executives or business partners, the attackers rely on a sense of authority or urgency to bypass normal procedures, checks, and balances.

Impact of BEC

BEC attacks have resulted in the loss of billions of dollars and have affected organizations across every vertical. The transnational criminal organizations responsible for these attacks employ a variety of methods to trick their victims into making wire transfers including spear-phishing, social engineering, malware, and identify theft. The funds are often difficult to recover due to the laundering and transfer techniques used by the attackers.

How Mitigate BEC Risk

  1. Define robust policies regarding the update or change to any billing or financial information
  2. Follow the “don’t rely on email alone” principle
  3. Apply Multi-Factor Authentication (MFA)
  4. Apply detection rules for email to identify potentially fraudulent or suspicious email messages
  5. Add visible banners to emails to indicate if it comes from an external and/or suspicious source

CREDENTIAL STUFFING

What is Credential Stuffing?

Credential stuffing occurs when an attacker attempts to gain access to systems or applications by leveraging the vast quantity of leaked credentials and the human propensity to reuse usernames and passwords. This is a subcategory of brute force attacks, automatically entering large numbers of credentials into services to identify potential account reuse.

Who is Impacted by Credential Stuffing

These attacks are becoming increasingly common and affect organizations across every vertical.

How Mitigate Credential Stuffing Risk

  1. Enable MFA for all user accounts
  2. Internal security teams can check user passwords against caches of leaked credentials to identify overlap, and force password resets where necessary
  3. Organizations can enable advanced brute force detection, multi-factor authentication, CAPTCHA, etc. to reduce the likelihood of credential stuffing

WEB APPLICATION ATTACKS

What are Web Application Attacks?

Web Application attacks continue to be one of the most common hacking methods US Cloud defends against. These attacks take many forms:

  • leveraging exploits or vulnerabilities in applications
  • weaknesses in configurations
  • denials of service, etc.

Impact of Web Application Attacks

Often these attacks are performed in an effort to gain access to sensitive or important data; other times they are used as a foothold into the organization as part of a larger attack.

How Mitigate Web Application Attack Risk

  1. Invest in defensive technologies including web application firewalls and scanners
  2. Integrate application security processes into all phases of the web application lifecycle
  3. Limit inbound requests to only required services

Is IoT device security the key to preventing more DDoS attacks?

IoT device securityImagine you came into work one morning, turned on your computer, and wasn’t able to access your company’s network. You may think the wifi is down or there’s a blip in the Ethernet, but then you start getting flooded with phone calls from other employees: They can’t access anything on their mobile phones, tablets, laptops … anything that requires connectivity to your company’s network. No matter what your IT team does, you’re still locked out of your network, servers, and applications.

This isn’t just any outage – it’s a Distributed Denial of Service cyberattack (DDoS), and it’s happening more and more frequently. You need to make sure you’re ready for it – otherwise you could face a tremendous disruption in business, lose money, and have to rebuild trust with your employees, customers, and clients.

DDoS attacks use junk data, usually sent from compromised machines or devices, to render a network, server, or application unavailable to legitimate users.

How can this happen? Increasingly, unsecured Internet of Things (IoT) devices such as video cameras are the source of this attack data. The more devices that are reliant on an internet connection, the easier it is becoming for bad actors to use these types of attacks to penetrate your IT environment and exploit your data. IoT isn’t going away – a recent study by PricewaterhouseCoopers (PwC) finds 63 percent of companies are planning to deploy IoT devices in the next year. IoT devices are estimated to grow from 20 billion last year to 51 billion by 2023.

You may think the answer is simple – secure IoT devices. The same PwC study also found that two-thirds of companies surveyed have an IoT security strategy in place or currently are implementing one to address the emerging risks of these devices. However, it isn’t so simple. The security mechanisms on IoT devices often are disabled by default, and security patches for the systems often are unused, allowing attackers to compromise them and use their collective bandwidth to steal your data. The distributed supply chain in which IoT devices are created and sold adds to the problem. There are three major players in IoT device manufacturing and selling:

  1. Specialized computer chip makers (e.g. Broadcom and Qualcomm)
  2. System manufacturers (e.g. Original Device Manufacturers)
  3. Brand-name companies selling to us (e.g. Fitbit and Apple)

Layer 1 is busy making the next chip, while Layer 2 is upgrading its product to work with the next chip. Maintaining older chips and products aren’t a priority. Even if you have a brand new smart watch, chances are the software components are four to five years old. The result is that hundreds of millions of devices are sitting on the Internet, unpatched and insecure. Hackers know this, and they’re working tirelessly to exploit this weakness and launch cyberattacks.

Despite the growing risk, the majority of attacks remain under the radar. Experts are finding that criminal DDoS attacks driven by extortion are coming to the fore once again. Hackers often contact businesses at a large scale and demand a bitcoin payment to prevent a DDoS. The majority of extortion attempts likely go unreported and uninvestigated. One trend fueling the rise of DDoS-extortion threats is the availability of DDoS-as-a-service. Cybercriminals rent their botnet to anyone willing to pay as little as a few dollars an hour, meaning no technical ability is required to launch attacks.

Lawmakers and regulators are trying to pressure companies to strengthen the IoT security. A bipartisan group of senators introduced a bill recently that would set security standards for IoT devices. In January, the Federal Trade Commission fined VTech Holdings Ltd. $650,000 for “failing to use reasonable and appropriate data measures” for an internet-connected toy.

As we’ve seen before, though, legislation and regulation take time to go into effect. Hackers aren’t waiting, and neither should you. How can you start to close the door on DDoS attacks on your enterprise?

First and foremost, you need to understand what’s critical to your business through a vulnerability assessment. Vulnerability assessments aren’t an opportunity to play the blame game. It’s an audit of what you have today in order to plan for a more secure tomorrow. Then, look for a managed security services provider like US Cloud which has endpoint security services that will ensure any device that is accessing your network won’t be susceptible to hackers trying to penetrate your enterprise’s defenses.

Using our next-generation anti-virus and activity recording for all your endpoints, US Cloud comprehensively monitors and protects your operating systems and infrastructure from cyberthreats. Contact US Cloud and get a quote today to ensure you’re not the next victim of a DDoS attack.

Secure Your Hybrid Cloud Environment

Cloud services offer efficiencies and productivity, agility, and cost savings. There is no question that it makes a lot of sense for many organizations to move to hybrid cloud solutions.

Many IT leaders are understandably hesitant about moving their IT infrastructure and critical workloads to the public cloud. In addition to public cloud security issues, they’re worried about losing visibility and control of their IT resources and data.

Ironically, many IT leaders don’t really know what’s in their IT environment, which means they have less visibility and control than they think. Recent ransomware and wiperware outbreaks have illuminated how few organizations have accurate records of what IT resources were operating in their environments, or even the status of the known systems. While this is due in part to the rapid adoption of things like shadow IT, it is also frequently the result of such things as personnel changes, mergers, and acquisitions. For many organizations, conducting a full network analysis before transitioning some of their network resources to the cloud is the first time an IT leader is able to scope a full and accurate view of what their IT environment looks like.

That has to be done before you can secure your hybrid cloud environment.

Where to Start

IT leaders need to know the delineation of responsibility between them and their cloud provider. That depends on whether their cloud provider is Infrastructure as a Service (IaaS), Software as a Service (SaaS), or Platform as a Service (PaaS).

Image result

A clear understanding of how much of the stack they are responsible for managing will drive the strategy for securing their hybrid cloud environment.

Key Strategies

Image result for who what where when whyKey strategies include knowing what’s running on your network, where things running on your network are being used and where users are connecting, why the things running on your network are being used, who is using the things running on your network and when.

Then, turn off what is not being used.

Unique Risks

Image result for credential managementCredential management is the biggest risk. Lots of cloud services are set up with security as an afterthought. Non-IT-trained people are setting up sharing services with things like non-expiring links, so confidential and proprietary information is sitting outside your network.

Emerging Trends

An emerging trend is that end users are setting up cloud services without considering the three tenants of information system management that IT professionals are trained to ensure – accessibility, availability, and security of information.

You don’t have someone handle the company finances who doesn’t know anything about accounting. Yet, we see companies letting unqualified personnel put the company’s proprietary information, the crown jewels, outside their network so that company data can walk out the door with them if and when they leave.

Help Wanted

Contact US Cloud to discuss your unique hybrid cloud security needs, roadmap your hybrid cloud security plan, or get pricing options for managed security services.

Follow These 3 Steps to Shine a Light on Cybersecurity in Your Enterprise

cybersecurity iconSecurity by its very nature is supposed to be in the background, working behind the scenes to ensure you don’t see the threats that could crop up at any moment. Hackers operate in the shadows, hiding in the dark web looking for areas to exploit in order to steal your sensitive customer data and intellectual property. However, an unfortunate consequence is that cybersecurity lacks the support and enforcement necessary to keep your data secure.

Your enterprise is likely similar to many we’ve worked with – complex daily operations, different demands requiring attention at all times, leaving many to have cybersecurity fatigue … if it’s more steps or workarounds for employees to do their jobs, they likely won’t participate.

In today’s environment, a focus on cybersecurity isn’t a luxury – it’s a necessity. Making sure that focus is achieved starts with your company’s culture. You may have fire extinguishers in your office building, but you prefer to prevent fires from ever happening so you don’t need to use the extinguishers, right? Same idea applies to cybersecurity – you want to prevent hackers from ever infiltrating your defenses so you don’t have to spend potentially millions of dollars dealing with the damage.

Here are three ways you can bring cybersecurity from the dark shadows of your office to the forefront of everyone’s minds, all the while keeping hackers out of your business:

Close the Skills Gap

As with many aspects of technology, the explosion in cybersecurity complexity and innovation is real. In the past, your IT security employees could learn a few cybersecurity protocols, monitor your on-premises system, and address any problems as they arose.

Thanks to software automation and cloud computing, taking a 20th century view of cybersecurity is no longer sufficient. Cybersecurity experts’ roles have changed, moving from being an order taker to one who needs to not only understand what’s happening but be able to make rapid decisions to keep your company secure.

Unfortunately, need hasn’t kept pace with skills: There’s a significant shortage of cybersecurity experts in today’s labor market, and that shortage will grow to 4 million people by 2020. While earlier cybersecurity systems may have been simple enough for one or two specialists to manage, the complexity of the modern landscape means you need a team possessing a constantly evolving skill set to cover emerging concerns. Instead of looking for a needle in a haystack, look to managed security service providers (MSSPs) like US Cloud, which already has experienced cybersecurity experts available to help you secure your data and applications.

Bring Your Security Team to Upper Management

As today’s cybersecurity experts evolve into tomorrow’s decision makers, they should also gain more influence in the boardroom. Security is a boardroom level issue, because the consequences of data breaches can lead to litigation, millions of dollars in damages, and loss of trust degrading your brand. Brand, money, and litigation are generally board level issues, and cybersecurity should be principal among them.

This should not only take place in the middle of a breach or other urgent challenge, but in all discussions. Technology and security experts have an invaluable vantage point thanks to their intimate knowledge of organizational structure, information flow, operational process, and more. Your leadership team has every reason to value their perspective.

By highlighting the dangers of security breaches and the efficiencies created by good security practices, cybersecurity professionals can prove the importance of integrating security measures into overall decision making, helping improve the bottom line. We have advisory services that can help you find the right ways to convince your boardroom cybersecurity is an issue they should bring to the forefront of their meetings moving forward.

Create a Security Culture

While a strong security approach needs leadership buy-in, that’s by no means the end of the battle. You need to take a top-down as well as bottom-up approach, which means working with your employees to help them recognize the need for stronger cybersecurity and how they can help.

It’s a two-way street, though: Security training is important, but take the time to listen to your employees and understand how they get their work done on a regular basis. If you just implement security policies that create barriers for employees to get their jobs done, they’ll find ways around them and subsequently leave you open to cyberattacks. It’s important to also take the time to communicate with them as threats arise: We all need regular reminders to remain vigilant against an ever-evolving world of security risks.

If cybersecurity was easy, we wouldn’t be losing billions of dollars a year to hackers. US Cloud has the experience and tools you need to create a specialized strategy to bring greater awareness and enforcement that safeguards your network and cloud from emerging cyber threats. From penetration testing and vulnerability assessments to managed security plans, hyper secure cloud and next-generation security tools, US Cloud has you covered.

Microsoft Premier and Unified Support Alternative - US Cloud

Next Steps:

Save 30-50% with US Cloud

US CLOUD is the only Gartner-recognized Microsoft Premier & MS Unified Support alternative. Enterprises worldwide are replacing Microsoft with US CLOUD to save 30-50% on support costs.

Enjoy ultra-responsive, 24/7 fanatical global support from domestic US teams while freeing up funds to invest in innovation, create competitive advantage, and drive growth.