How to Stop 2015's Cyber Attacker

By Annifer Jackson

Less than a generation ago, only a few people knew about the Internet. In those days the privileged few used email; e-commerce was in its infancy; mobile phones had carrying handles; and online banking was yet to be introduced.

READ OUR LATEST ISSUE: January 2015 

Now, the Web dominates what we do and how we do it: we live in the moment, in constant communication with each other and the world around us.

The potential for new technology seems endless, with predictions hitting mind-blowing figures. But as global reliance on technology has grown, so too has the need for heightened awareness of the associated risks. With forecasts from Gartner suggesting that 4.9 billion connected things will be in use in 2015, reaching 25 billion by 2020, our personal and professional lives are only going to become more connected.

The use of our digital DNA has already started and developed significantly in 2014. All types of ‘things’ in our everyday lives are now fitted with microchips that tap into our digital details, using huge amounts of data and affecting how we live and work. Today, billions of electronic chips actively connect everyday gadgets like printers, webcams and traffic lights, to the Internet.

While this automated connectivity can provide businesses with significant gains in terms of efficiency and productivity, it’s created a host of new opportunities for cybercriminals, who are starting to exploit this technology for their gain. So, it’s time for organisations to wake up to the risks and implement the correct security procedures to protect their businesses.

Many perceive cybercrime to be merely fiction, but we’re already seeing examples of how cybercriminals are exploiting new technology. For example, in Moscow, speed cameras and traffic monitoring systems were infected with an unidentified Trojan which stopped authorities catching traffic offenders. A seemingly minor attack which had huge effects on function, and revenue collection.

Similarly, in Antwerp, Belgium, the systems controlling movement and location of shipping containers were breached via malware, allowing containers concealing drugs, money and weapons to enter the country. So it’s clear that increasingly sophisticated cyber techniques are being used not only to steal data, but to put a whole host of companies at risk.

In this environment, businesses need to consider that any aspect of their company in which data is held, is under threat. Even the untraditional devices in our professional and personal lives are becoming connected, so the opportunity for intrusion is immediately broadened.

Although cyber-espionage or targeted attacks on connected devices may sound like some strangely exotic activity from the movies, the harsh reality is that almost any business can become a target, either directly or as a stepping stone to reach a wider victim base.

By Kirill Slavin, general manager, Kaspersky Lab UK&I

Follow us on Twitter @BizReviewEurope and check out our Facebook page

Share

Featured Articles

Top 10 most innovative telecom operators in the Middle East

With Dubai-based Telecoms World Middle East in full swing, we chart the most innovative telcos from the region – and look at how they are transforming

Top 10 fastest-growing Indian companies in the UK

Business Chief takes a look at the top 10 fastest-growing Indian companies in the UK, according to the India Meets Britain Tracker from Grant Thornton

Top 10 workplaces prioritising people and planet in the UAE

Sustainable, flexible, collaborative, tech-driven, and amenities-rich, the office of the future considers both people and planet – here are 10 in the UAE

Top 10 female HR execs leading Saudi’s workplace transition

Leadership & Strategy

Top 10 largest asset managers by AUM operating in the UAE

Corporate Finance

Top 10 female CEOs leading Africa’s biggest businesses

Leadership & Strategy