Management Magazine
No Result
View All Result
  • ABOUT
  • KIMSOM
  • TRAINING
  • MEMBERSHIP
  • Login
  • Register
  • Home
  • News
  • Special Features
  • Leadership
    • Perspective
    • Smart Leadership
    • Strategy
    • Tactics
  • Business
    • Money Matters
    • Smart Solutions
    • Investing
    • Personal Finance
    • Wealth Creation
  • Management
    • The Big Idea
    • Office Diary
    • Hands on Management
    • Future of Work
  • Lifestyle & Travel
    • Wellness
    • Travel
    • Tech
    • Lifestyle
    • Entertainment
magazines
SUBSCRIBE
  • Home
  • News
  • Special Features
  • Leadership
    • Perspective
    • Smart Leadership
    • Strategy
    • Tactics
  • Business
    • Money Matters
    • Smart Solutions
    • Investing
    • Personal Finance
    • Wealth Creation
  • Management
    • The Big Idea
    • Office Diary
    • Hands on Management
    • Future of Work
  • Lifestyle & Travel
    • Wellness
    • Travel
    • Tech
    • Lifestyle
    • Entertainment
No Result
View All Result
Management Magazine
No Result
View All Result
Home Tech

Computer security threats to look out for

Denis Kiptoo by kimmag
May 24, 2021
Reading Time: 10 mins read
0

Cyber security predictions make it important for organisations to stay one step ahead of cybercriminals’ exploits. Here are crucial key security predictions for 2017. 

RELATED POSTS

Leveraging AI for business efficiency

How Organisations Can Deploy Emerging Technologies to Ensure Diversity, Equity, and Inclusion

The State of Artificial Intelligence & Business Strategy

By RICK ROGERS

Prediction is very difficult, especially if it’s about the future,” as Nils Bohr, the Nobel laureate physicist put it. But as we begin 2017, it is useful to look forward ‘and try to anticipate the cyber security trends that lie ahead; ‘and reflect on what has happened over the past year, to see how accurate previous predictions were. Check Point Software Technologies predicted the following security threats in 2016:

1.The emergence of sophisticated ‘and custom-designed malware designed to get past organisations’ defences. Attackers are using bespoke variants of existing malware, which can bypass traditional antivirus ‘and s ‘andboxing tools. The Check Point Software 2016 Security Report revealed that 971 unknown malware variants were downloaded to enterprise networks every hour.

2. Mobile attacks

In 2016,  it was predicted that they will increase as mobile devices became more commonplace in the workplace, offering hackers direct ‘and potentially lucrative access to personal ‘and corporate data. This too was borne out – we saw major vulnerabilities like Quad rooter emerge ‘and new zero day threats discovered, as well as ongoing increases in mobile malware targeting vulnerabilities.

3. Attacks on critical infrastructure.

Buy JNews
ADVERTISEMENT

We expected these to rise as cybercriminals sought to take advantage of both the inherent vulnerabilities in critical infrastructure computer systems ‘and the potentially huge damage that can be wreaked. Sure enough, an attack using ‘Black Energy’ malware struck a Ukraine power company. Warsaw’s Chopin Airport was also attacked as well as the systems of the Bowman Dam in Rye, New York.

4. Cyber criminality taking advantage of the growing Internet of Things ‘and targeting smart devices.

2016 saw one of the largest DDoS attacks ever targeting security blogger Brian Krebs’ website, which was launched from millions of IoT security cameras ‘and similar devices.

Unfortunately, these predictions for 2016 proved to be accurate. Like most cyber security professionals, I would prefer that they were not realised. I would much rather organisations didn’t get infected by malware, hacked, or suffer data breaches. But by predicting the next wave of threats, it is vital for organisations to stay one step ahead of cybercriminals’ exploits. So here are five key security predictions for 2017.

Mobile: moving targets

As attacks on mobile devices continue to grow, we can expect to see enterprise breaches that originate on mobile devices becoming a more significant corporate security concern. The recent discovery of not one, but three zero-day vulnerabilities in Apple’s iOS following an attempted attack on a human rights activist’s phone, highlights how rapidly the mobile surveillance ‘and cybercrime industry is exp ‘anding – ‘and the need for organisations to deploy protections on their mobile estates against malware, interception of communications ‘and other vulnerabilities.

IT ‘and OT convergence

In the coming year, we expect to see cyber attacks spreading further into the Industrial companies. The convergence of informational technology (IT) ‘and Operational Technology (OT) is making both environments more vulnerable, particularly the operational technology. These environments often run legacy systems for which patches are either not available, or worse, simply not used.

Many critical industrial control systems are open to the Internet – a recent report found over 188,000 systems in 170 countries were accessible this way. 91 per cent were remotely exploitable by hackers, ‘and over three per cent had exploitable vulnerabilities. Manufacturing, as an industry, will need to extend both systems ‘and physical security controls to the logical space ‘and implement threat prevention solutions across both IT ‘and OT environments.

Critical infrastructure

Once again, we are placing critical infrastructure in our predictions for the coming year – globally, as it remains highly vulnerable to cyber attack. Nearly all critical infrastructure, including nuclear power plants, electricity grids ‘and telecoms networks, were designed ‘and built before the threat of cyber attacks. In early 2016, the first blackout caused intentionally by a cyber attack was reported. Security planners in critical infrastructure need to plan for the possibility that their networks ‘and systems will see attack methods consistent with multiple potential threat actors: nation-state, terrorism ‘and organised crime.

Threat prevention

For enterprises, Check Point predicts that ransom ware will become as prevalent as other forms of cyber attacks. Successful attacks can shut down a business’s day-to-day operations, ‘and mitigating them dem ‘ands a multi-faceted prevention strategy, including advanced s ‘andboxing ‘and threat extraction.

Businesses will also need to consider alternative ways to cope with the people who launch cyber attacks. Collaborative strategies like coordinated take downs with industry peers ‘and law enforcement will be essential. While paying a ransom is never recommended because it encourages future attacks, sometimes it is the only option for recovering data ‘and the ability to function. As such, the establishment of financial reserves to speed up payments will become increasingly common.

We also predict more targeted attacks to influence or silence an organisation, with ‘legitimate’ actors launching such attacks. The US Presidential campaign ‘and elections showed this possibility ‘and will serve as a precedent for future campaigns.

Cloud cover

As enterprises continue to put more data on the cloud, providing a backdoor for hackers to access other enterprise systems, an attack to disrupt or take down a major cloud provider will affect all of their customers’ businesses. While generally disruptive, it would be used to impact a specific competitor or organisation who would be one of many affected, making it difficult to determine motive.

Ransomware attacks are expected to impact cloud-based data centers too. As more organisations embrace the cloud, both public ‘and private, these types of attacks will start finding their way into this new infrastructure, through either encrypted files spreading from cloud to cloud or by hackers using the cloud as a volume multiplier.

Email: press@us.checkpoint.com

Rick Rogers is the Manager for East ‘and West Africa at Check Point Software Technologies.

Tags: cloud computingconsumers.customerscyber criminalsKenya Institute of ManagementKIMmalwareManagement Magazinerootersammi nderitusecurity check pointsecurity threatstechnologyTwittervulnerabilitieswork environmentworkplace
ShareTweetShare
Denis Kiptoo

kimmag

Related Posts

Leveraging AI for business efficiency
Editor's Picks

Leveraging AI for business efficiency

September 8, 2023
Management Magazine - How Organizations can deploy emerging technologies to ensure DE&I
Editor's Picks

How Organisations Can Deploy Emerging Technologies to Ensure Diversity, Equity, and Inclusion

November 5, 2021
Management Magazine -artificial intelligence and business strategy
Smart Solutions

The State of Artificial Intelligence & Business Strategy

November 4, 2021
Enhancing Food Safety & Security through Science, Technology and Innovation
Technology

Enhancing Food Safety & Security through Science, Technology and Innovation

November 1, 2021
Banking on Digital Technologies to Enhance the Future of Work in Africa
Future of Work

Banking on Digital Technologies to Enhance the Future of Work in Africa

October 14, 2021
Three Ways Artificial Intelligence Is Disrupting Asset Management
Technology

Three Ways Artificial Intelligence Is Disrupting Asset Management

October 22, 2021
Next Post

The value of innovative thinking

Next President can boost Kenya`s growth by supporting SMEs

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Silver linings in a financial meltdown

September 16, 2021
Could Agribusiness Be The Untapped Wealth Creation Gem?

Could Agribusiness Be The Untapped Wealth Creation Gem?

October 28, 2021

Driving traffic to your website

August 1, 2019

Popular Stories

  • Management Magazine - Entertainment - Book Review

    Book Review: Go Tell the Bees That I Am Gone (Outlander Series #9)

    0 shares
    Share 0 Tweet 0
  • Tax measures as impetus to education sector

    0 shares
    Share 0 Tweet 0
  • How technology has improved healthcare

    0 shares
    Share 0 Tweet 0
  • How the old education system created failures

    0 shares
    Share 0 Tweet 0
  • I am living my childhood dream

    0 shares
    Share 0 Tweet 0
Management Magazine

Management is a monthly magazine targeting middle and senior level managers from all sectors of the economy.

Recent Posts

  • How Gig Economy is Empowering a New Generation of Workers
  • The Synergy of Emotional Intelligence and Sustainability
  • Handling employee exit

KENYA INSTITUTE OF MANAGEMENT

  • ABOUT
  • KIMSOM
  • TRAINING
  • MEMBERSHIP

Get a year of access for Premium Content


SUBSCRIBE

© 2021 Management Magazine - A Publication of Kenya Institute of Management.

No Result
View All Result
  • Home
  • News
  • Special Features
  • Leadership
    • Perspective
    • Smart Leadership
    • Strategy
    • Tactics
  • Business
    • Money Matters
    • Smart Solutions
    • Investing
    • Personal Finance
    • Wealth Creation
  • Management
    • The Big Idea
    • Office Diary
    • Hands on Management
    • Future of Work
  • Lifestyle & Travel
    • Wellness
    • Travel
    • Tech
    • Lifestyle
    • Entertainment

© 2021 Management Magazine - A Publication of Kenya Institute of Management.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?