How to Stop 2015's Cyber Attacker
Less than a generation ago, only a few people knew about the Internet. In those days the privileged few used email; e-commerce was in its infancy; mobile phones had carrying handles; and online banking was yet to be introduced.
READ OUR LATEST ISSUE: January 2015
Now, the Web dominates what we do and how we do it: we live in the moment, in constant communication with each other and the world around us.
The potential for new technology seems endless, with predictions hitting mind-blowing figures. But as global reliance on technology has grown, so too has the need for heightened awareness of the associated risks. With forecasts from Gartner suggesting that 4.9 billion connected things will be in use in 2015, reaching 25 billion by 2020, our personal and professional lives are only going to become more connected.
The use of our digital DNA has already started and developed significantly in 2014. All types of ‘things’ in our everyday lives are now fitted with microchips that tap into our digital details, using huge amounts of data and affecting how we live and work. Today, billions of electronic chips actively connect everyday gadgets like printers, webcams and traffic lights, to the Internet.
While this automated connectivity can provide businesses with significant gains in terms of efficiency and productivity, it’s created a host of new opportunities for cybercriminals, who are starting to exploit this technology for their gain. So, it’s time for organisations to wake up to the risks and implement the correct security procedures to protect their businesses.
Many perceive cybercrime to be merely fiction, but we’re already seeing examples of how cybercriminals are exploiting new technology. For example, in Moscow, speed cameras and traffic monitoring systems were infected with an unidentified Trojan which stopped authorities catching traffic offenders. A seemingly minor attack which had huge effects on function, and revenue collection.
Similarly, in Antwerp, Belgium, the systems controlling movement and location of shipping containers were breached via malware, allowing containers concealing drugs, money and weapons to enter the country. So it’s clear that increasingly sophisticated cyber techniques are being used not only to steal data, but to put a whole host of companies at risk.
In this environment, businesses need to consider that any aspect of their company in which data is held, is under threat. Even the untraditional devices in our professional and personal lives are becoming connected, so the opportunity for intrusion is immediately broadened.
Although cyber-espionage or targeted attacks on connected devices may sound like some strangely exotic activity from the movies, the harsh reality is that almost any business can become a target, either directly or as a stepping stone to reach a wider victim base.
By Kirill Slavin, general manager, Kaspersky Lab UK&I
Follow us on Twitter @BizReviewEurope and check out our Facebook page.