TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

    November 7, 2022

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

      November 7, 2022

      Devialet brings its sci-fi design aesthetics to a $790 portable speaker

      November 7, 2022

      Elon Musk’s response to fake verified Elon Twitter accounts: a new permanent ban policy for impersonation

      November 7, 2022

      The iPhone 14 Pro and Pro Max will come with ‘longer wait times’ due to factory lockdown

      November 6, 2022

      Meta’s reportedly planning to lay off ‘thousands’ of workers this week

      November 6, 2022
    • Business
    • Cyber Security
      National Security News

      List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

      September 24, 2022

      Cybersecurity ranked most serious enterprise risk in 2022

      August 31, 2022

      Registration open for CISA virtual summit on K-12 school safety

      August 31, 2022

      What do the Trickbot leaks reveal about Russian cybercrime?

      August 31, 2022

      What cybersecurity measures do CISOs outsource?

      August 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»5 Forecasts to Inform Digital Risk Protection in 2019
    Cyber Security

    5 Forecasts to Inform Digital Risk Protection in 2019

    January 10, 2019Updated:January 14, 2019No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Last year was bookended by two major corporate data breaches – Under Armour in February and Marriott in December – with incidents too numerous to count in between. As cybersecurity professionals, we have an opportunity to learn from trends and events that have shaped the digital risk landscape to more effectively mitigate risk in 2019. Here are five of the top trends and key takeaways to help ring in a safer new year.

    1. BEC campaigns will continue to increase. According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since October 2013. The barriers to entry for these types of scams continue to lower, with attackers able to take advantage of accounting and finance email credentials available in public data breaches and leaked data. Less sophisticated actors can even solicit the help of a BEC-as-a-service provider online or take advantage of the 12 million publicly accessible email archives exposed through misconfigured rsync, File Transfer Protocol (FTP), Server Message Block (SMB), S3 buckets and Network Attached Storage (NAS) drives. 

    Key takeaways

    Implement mitigation measures such as multiple person authorizations to approve significant wire transfers and multi-factor authentication. Reduce instances of file exposure by ensuring any online file-sharing services – like rsync, FTP and SMB – are not inadvertently misconfigured and exposing sensitive emails or files. 

    2. The push and pull between ransomware attacks and cryptomining will persist. In 2018 we saw sharp declines in the number of reported attacks involving new ransomware variants, but this didn’t mean threat attackers were taking a break. These dips in activity coincided with the rise of mining fraud, a stealthier way to gain cryptocurrency from their victims. The push and pull will continue as the value in cryptocurrency rises and falls; when cryptocurrency value drops, the value of credit card data, credentials and intellectual property (secondary objectives of ransomware campaigns) rises.

    Key takeaways:

    The tradeoff between ransomware and cryptomining will remain as cryptocurrency volatility drives threat actor behavior. Organizations should continue to implement ransomware risk mitigation strategies such as data and system backups, segregation of duties, logical access control, endpoint protection and user security and awareness training. At the same time, to mitigate the risk of cryptomining, organizations should authenticate access to cloud services and blacklist command and control (C2) domains used by cryptocurrency botnets and mining tools.

    3. Companies will open their wallets for GDPR fines, but how widely is to be determined. The General Data Protection Regulation (GDPR) came into force in 2018 with the potential of hefty financial penalties for failure to comply – up to 4 percent of global turnover or 20 million Euros (nearly $23 million), whichever is greater in certain instances. It takes time to investigate incidents and develop cases, so the first actual fine was not issued until November 2018 to a German messaging company called Knuddels. Following a breach of its database in July, the company subsequently detected customer email addresses and plain-text passwords on data sharing sites. According to regulators, the company knowingly violated its duty to protect customer data by storing passwords in clear text, although due to several factors, including the company’s internal responses and transparency with the officials, the fine was set at 20,000 Euros.

    Key takeaways:

    We’re in the very early days of GDPR enforcement and this is only a sample size of one, but it appears transparency and clear communication with officials may give organizations some bonus points and potentially reduce a fine. Whether or not future instances will back this up, it is safe to assume that organizations with a risk-based approach to security are better equipped than others to deal with GDPR.

    4. Emotet banking trojan will be modified and used for new purposes. Involved in a high-volume of activity throughout 2018, Emotet malware has become increasingly sophisticated. With its ability to download additional modules, we have observed Emotet used as the initial stage downloader for other banking trojans such as IcedID and TrickBot. As of November 2018, the malware once again updated its capabilities, adding full email message harvesting to its toolbox.

    Key takeaways:

    Emotet could continue being used as a downloader to facilitate the spread of banking trojans or other malware. However, its capability to harvest emails could also be used to conduct more convincing spearphishing campaigns against target organizations, and more broadly by threat actors motivated by information gathering across various sectors. Watch for further updates to Emotet and sectors beyond the financial services industry should now monitor for this malware.

    5. MITRE ATT&CK framework will move towards becoming a threat intelligence standard. The MITRE ATT&CK framework provides a common vocabulary for how to talk about threat intelligence. Having a universal set of terminology and standards that security practitioners can easily understand, which are mapped to specific techniques that can be assessed and hopefully controlled, will contribute to better defenses and mitigation strategies by security teams in 2019.

    Key takeaways:

    We can expect the MITRE ATT&CK framework to become an increasingly popular tool to enable productive discussions across the security industry. If you aren’t already familiar with the framework, learn more about it and continue to stay apprised as it evolves. 

    There are just five of the trends I’ve chosen to highlight, but there are many more. Regardless of how the threat landscape evolves in 2019, organizations that continuously monitor their digital footprint and understand their online exposure so that they can make the right investments with limited staff, money and time, will be the most effective at mitigating digital risk in the new year.

    Alastair Paterson is CEO and Co-Founder of Digital Shadows. Alastair has worked for over a decade advising secure government and FTSE 100 clients on large-scale data analytics for risk and intelligence. Before founding Digital Shadows in 2011, Alastair was International Propositions Manager at BAE Systems Detica working with clients in the Gulf, Europe and Australasia. He holds a first class MEng in Computer Science from the University of Bristol.

    Previous Columns by Alastair Paterson:
    Tags:



    Source link

    Do you need investigative support? Digitpol is a licensed and accredited investigation agency specialising in operational support and investigative services. Digitpol is specialise in the Investigation of Theft, Fraud, Corruption, Commercial Espionage, Cybercrime Investigation and Intellectual Property Crime. Digitpol’s team has extended skills in Data Recovery such as Computer Forensics, Mobile Phone Forensics, eDiscovery, Internet Monitoring and Automotive Forensic Investigation.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    National Security News

    List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

    September 24, 2022 Cyber Security

    Cybersecurity ranked most serious enterprise risk in 2022

    August 31, 2022 Cyber Security

    Registration open for CISA virtual summit on K-12 school safety

    August 31, 2022 Cyber Security

    What do the Trickbot leaks reveal about Russian cybercrime?

    August 31, 2022 Cyber Security

    What cybersecurity measures do CISOs outsource?

    August 30, 2022 Cyber Security

    SIA announces Women in Security Forum scholarship recipients

    August 30, 2022 Cyber Security
    Editors Picks

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022

    Google Cloud Says Running Validator on Solana Blockchain

    November 7, 2022

    European stocks rise as investors boosted by China speculation

    November 7, 2022
    Trending Now

    Evergrande creditors sell ‘Versailles mansion’ plot in Hong Kong

    By techbizweb

    OpenSea Creates Tool for NFT Creators to Enforce Royalties On-Chain

    By techbizweb

    FTSE chairs warn of declining relations with institutional investors

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2023 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.