martes, 22 septiembre 2020
Visitas totales a la web: 86043493

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

As Businesses Reopen, A New Storm Of Cybercrime Activity Looms

Emil Sayegh. President and CEO of Ntirety, a global managed cloud services provider. I cover all things cloud computing, IoT, and innovation.

There is nothing ordinary about the amount of disruption that will impact our lives moving forward as countries and states reopen following the coronavirus pandemic. In the context of the cloud, disruptions caused by COVID-19 have opened the door to another type of virus: cybersecurity threats. Today we are witnessing a rapid rise of opportunistic cybercriminal activity taking advantage of the chaos created by COVID-19.

Cyber security with shield symbol futuristic sketch
For companies fighting to remain afloat due to challenges faced during COVID-19, a cybersecurity … [+] GETTY

Focal concerns about economic recovery and a potential second wave of human infection are abounding. Still, the concern for many companies should also include heightened cybersecurity threats that can easily break companies before they have a chance to relaunch. For the many companies that are already fighting to remain afloat due to challenges faced during COVID-19, a cybersecurity breach could quickly mean the end. As businesses navigate this “new normal,” they must address weaknesses in their IT strategies exposed by COVID-19 and consider implementing a better preparedness plan to avoid long-term damage.

New Workforce Scenarios Expose Gaps

Remote work has hastily spread everywhere, making IT departments justifiably cautious, even scared, as their users work in new environments with new tools including:

  • Video Conferences
  • File Sharing
  • Virtual Desktops
  • Group Chat
  • VPN
  • Collaboration
  • Web-Based Applications and Tools

Incorrect use or misconfigurations create new cyberthreat opportunities to lurking bad actors. A missed certificate, a wrong setting, insufficient management, or unmanaged user training are all open windows for cybercriminals to sneak through.

Rapid Rise Of Major Security Incidents During the COVID-19 Crisis

The pace of major security incidents will continue to increase in the near future. While not uncommon, an increased frequency of ransomware, breaches, and exploits could be a harbinger of things to come. The month of May, for example, saw a staggering number of security breach reports:

A significant data breach at UK airline EasyJet led to the loss of information on more than nine million customers to “highly sophisticated” hackers, including credit card details of more than 2,000 customers.

The FBI issued a warning about a credit card skimming exploit that takes advantage of a plugin in the thoroughly used e-commerce platform Magento. As many as 1,700 sites may have been affected.

Bank of America reported an application data leak on a test server associated with customer Paycheck Protection Program (PPP) loans.

Industry reports indicated continued unsecured cloud storage components and security struggles with ever-more complicated clouds.

report focused on small businesses (SMB) showed how they are facing the same spectrum of security and attack threats as large companies. News of remote takeover vulnerabilities on network-attached storage (NAS) devices to emerging ransomware infections amplify these concerns, with as many as half of all cyberattacks targeting small businesses.

An Age of Scams

Uncertainty, particularly in the early days of the pandemic, has resulted in a media blitz and information overload. Unfortunately, with too much information out there, misinformation, distrust and additional openings are ripe realities for cybercriminals to explore and leverage digital scams, such as:

  • COVID-19 and Health Scams
  • Unemployment Scams
  • Stimulus Fund Scams
  • Government Business Loan Scams
  • Lawsuit Scams
  • Fake Mask Scams

Uncertain Times Produce Organizational Threats

The managed chaos of cyber-threats is an everyday reality, but in times of challenge, chaos escalates exponentially. Scammers scale up attacks such as phishing, hoping to trick employees into releasing or transferring funds, improperly changing bank routing information, and installing malicious software. They try to get employees to give up credentials, click on ransomware in emails and more. Hackers know that users are prone to using the same password across multiple logins, which could also lead to breaches across other platforms.

This novel climate is a perfect storm for cybercrime activity. Post-COVID-19, businesses cannot afford to be compromised in this fragile world where any resource can serve as an attack source. If there was ever a time for hackers to open their cybercrime toolbox, the time is now. Please stay safe by exercising proper online security hygiene. If you are not sure, or if this is not your company’s competence, this is the time to ask for help from experts.

Fecha de publicaciónjunio 18, 2020

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El paracaidista español que humilló a los «temibles» espías soviéticos

Joaquín Madolell, natural de Melilla y militar del Ejército del Aire, desarticuló la mayor red del espionaje...

UME, para servir

Uno se pregunta, al ver las estadísticas de bajas, por qué no funcionarán los gobernantes con la misma prontitud y eficacia que los militares. Circula un video en el que un general, a pesar de la mascarilla, explica claramente el funcionamiento de las Unidades militares; una perfecta organización en la que un estado mayor planea y dirige las operaciones en curso, mientras otro va programando las operaciones futuras. Todo un engranaje funcionando con eficacia, en silencio y sin alardes, donde cada elemento sabe lo que tiene que hacer y cómo hacerlo, sacando el máximo rendimiento de sus escasos medios, y a pesar de lo imprevisto y desconocido de un enemigo que dio la cara cuando ya estaba dentro.

Últimas noticias

El contraataque de Álvarez-Pallete

La retirada de César Alierta como máximo responsable de Telefónica en 2016 abrió las puertas de la Presidencia a su delfín...

¿Y AHORA QUÉ?

En España, nuestra Nación, para algunos simplemente país o IBEX35, todo está dicho en el Congreso, en la prensa y en las redes sociales....

Mozambique army surrounds port held by Isis-linked insurgents

Militants seized the Mocímboa da Praia site, which is near gas projects worth £45bn, last week Government troops are...

Strategic Security: Forward Thinking for Successful Executives

An engaging study of management from a security industry perspective, Strategic Security: Forward Thinking for Successful Executives unfolds like an academic program on strategic...

El desconocido error histórico de «Salvar al Soldado Ryan» con el Día D y el capitán Miller

Francis L. Sampson no era un maestro de escuela, sino un capellán militar de la 101ª División Aerotransportada Existen...