Current cyber security trends

Date: 5 May 2018, Category: Technology


What do you understand by cybersecurity

Cybersecurity refers to a combination of controls, technologies, and processes that protect networks, systems, and data from cyber-attacks. Cybersecurity is said to be useful if it can mitigate the risks associated with cyber-attacks and provide protection to the organization against unauthorized penetration and exploitation of systems, technologies, data, and networks.

A cyber-attack may disrupt the organization's system and result in substantial reputational and financial damage. Cyber attacks happen even to the top protected firms.

The various cybercrimes witnessed in 2017 and most of them being High profiled cybercrimes, there is a lot to discern. Even though there are many security updates, the cyber-attacks keep rising every day.

In 2017 we have had some top companies subjected to cyber-attacks. These include Delloite, Uber, and Equifax. There is also the notorious ransomware attack. The big question remains whether the cybercrimes will reduce or increase in future. If the incidences increase what possible form would they take?

Here are some current trends and well as future predictions for Cybersecurity.

Emerging standards for multi-factor authentication

Data breaches succeed because of stolen, weak or default passwords. This statement is supported by the research done by Verizon in 2016 on Data Breach investigations. Because most people and organizations use simple authentications based on familiar things such as date of birth pet names, year of birth then hackers can easily succeed in finding out the passwords. Companies should use multi-factor authentication instead of single-factor authentication to protect their information.

More sandbox-evading malware

In the recent past, the technology of sandboxing has become a more popular way of detecting malware as well as preventing malware infections. Hackers and cybercriminals are getting ways to dodge this technology. Today you find strains of new malware can recognize when in the sandbox and be still until when they get out of the sandbox. That is when they execute their malicious code.

Many companies fail to comply with General data protection regulations

On May 25th, 2018, the General Data Protection Regulation (GDPR) came into effect. This regulation brought into practice significant changes in the data protection directive that has been in use over the years. These new changes are; more stringent consent laws, increased territorial scope, elevated rights for data issues among others.

Hefty fines are imposed to culprits on cases non-compliance up to a ceiling of €20m or 4% of annual turnover, whichever is greater. So far many companies have failed by choice to comply with GDPR claiming that compliance cost is higher than the risks being addressed.

Artificial Intelligent-powered attacks

The technology of machine learning also known as artificial intelligence is used to identify threats of cybersecurity. In this case, software that can learn following the consequences of past events helps predict and discover possible cybersecurity threats. Most of the US cybersecurity professionals use AI.

This technology brings concerns that hackers will use it in future to carry out more complex cyber-attacks. For instance, the attackers may automate the collection of specific information of a particular organization using AI. The worst incident is when vital information lands in the hands of hackers. Also, hackers may use machine learning to crack passwords based on various factors such as geographical locations and demographics.

The adoption of more sophisticated security technologies

Today, there are various new evolving technologies whose adoption grows wider every day. Remote browsers are good examples of such technologies which help in isolating a browsing session of a user from network or terminals. Luring technologies from hackers work by mimicking company’s critical systems. They act as baits for hackers trying to steal the company’s data.

Solutions that can identify and respond to abnormal systems behaviors continue to emerge and spread across the globe. There are good examples of such solutions that include endpoint detection and response solutions, and network traffic analysis.

Endpoint Detection and response solutions monitor the endpoints and give a warning alert to the system admins in case of abnormal system behavior.

Network traffic analyzer monitors the traffic across the networks to determine the origin, size, content type and the destination of all data packets passing through the system. This security check ensures that data packets arrive at the desired destinations unaltered. NTA can detect an additional activity that may occur while data packets are in transit.

A rise of state-sponsored attacks

Increased number of state cyber-attacks raises much concern in the subject of cyber security. These attacks target not only financial gains but also the reputation of the states as well as theft of critical information. Nation cyber-attacks are politically fueled. They aim at acquiring intelligence that could be used to barricade a specific political body. An excellent example of a state cyber-attack is where voting systems are manipulated to produce results that are in favor of a particular candidate.

State cyber-attacks are mostly state-funded undertakings which are, very sophisticated, targeted and have high disruptive results when launched successfully. Countries such as China, Israel, Russia, USA, and North Korea are known for the notorious propagation of state cybercrimes.

State cyber-attacks execution occurs with high expertise levels as well as huge funding. This way, they become more difficult to guard. The state governments should ensure that they isolate their state's internal networks and systems from the internet. All staff members must undergo intensive security checks to ensure not of them filters data to an enemy to aid in propagating cyber-attacks.

Also, the staff handling technology must receive sufficient training on the possible attacks and ways of mitigating them. The government procurement officers should ensure that they source all technology devices and services from trusted sources.

Ransomware and Internet of Things (IoT)

The ransomware has not been popular until recently when there was such as case. Most IoT devices are not used to store essential data. If such devices are infected, no one would be bothered to pay a ransom. In other words, people pay less attention to the security of IoT devices. It would be crucial to underestimate not the level of damage an IoT ransomware could bring.

For instance, cybercriminals could decide to target essential systems like the power grids. If the victim does not choose to pay the ransom immediately, the attackers may shut down the network. Otherwise, the attackers may target factory lines, home appliances such as smart ovens, fridges, and smart cars.