Page 13 - GS170102
P. 13

News




        Cyber Security practice analysts consider the leading         easy to use. Researchers believe insecure wireless
        methods of cybercrime and their potential impact on           networks will provide easily accessible methods of
        business owners and consumers:                                transport for nefarious drone attacks.

           •  Business email compromise (BEC) attacks: Email          Drone use in the commercial sector is also on the
              continues to be the leading conduit of fraud and        rise, adding to the possibility of enterprise-scale
              malware, accounting for $19 million in losses in Sin-   drone attacks. Analysts believe drones will be de-
              gapore between January and September 2016. Glob-        ployed to jam GPS signals on marine and terrestrial
              al  BEC  attacks  increased  20  percent  worldwide in   vehicles and to drop contaminated USB drives into
              2016, compared with the previous year. Businesses       critical network environments.
              that transact internationally are most vulnerable to
              these attacks, researchers stated.                Recommended remedial measures
              Charles  Lim,  Industry  Principal,  Cyber  Security   In addition to their predictions and warnings, Frost &
              practice, Frost & Sullivan, Asia Pacific, predicted that   Sullivan analysts provided salient advice and described
              BEC will be more prevalent than both ransomware   enhanced security methods for protecting critical
              and advanced persistent threat attacks throughout   infrastructures. Following are some examples of how
              Asia-Pacific in 2017. "As BECs are relatively easier to   collaborative efforts and emerging technologies can
              execute and evades cyber defense tools better than   protect against cybercrime:
              other popular attack vectors such as ransomware      •  Implement emerging technologies: Distributed
              and APTs, it can potentially be the main cyber threat   ledgers such as blockchain can be used to safely
              in Asia," he stated.                                    transmit sensitive intelligence between trusted par-

           •  Distributed denial of service (DDoS) volumetric         ties. "Blockchain may emerge as the technology to
              attacks:  DDoS  attacks caused  nationwide Internet     facilitate the exchange as it authenticates the trusted
              outages in 2016. Cyber  attackers  exploited  device    party to contribute, obfuscates the contributor's de-
              and network vulnerabilities caused by insecure net-     tail with anonymity, and offers a tamper proof sys-
              works with insufficient defenses against volumetric     tem that prevents unauthorized alteration of any
              attacks and default passwords on newly-deployed         data shared," researchers noted.
              IoT devices, triggering day-long Internet outages in   •  Share and distribute threat intelligence: The Infor-
              some areas.                                             mation Sharing and Analysis Centers (ISAC), a col-
           •  IoT entry point attacks:  Criminals used insecure       laborative effort of government and private sector
              IoT devices to gain access into numerous business       participants, is focused on creating a public forum
              networks in 2016, report authors noted. The preva-      where individuals and organizations can share in-
              lence of insecure devices and default passwords has     formation about the evolving threat landscape. Crit-
              prompted some governments to expand regulatory          ics have questioned some participants' authority,
              guidance and security standards for IoT devices, an-    warning that untrusted sources may deliberately or
              alysts noted. The authors cited a recent botnet attack   unwittingly propagate inaccurate intelligence.
              on IP cameras as an example of "how manufactur-      •  Employ enterprise-level, proactive security teams:
              ers did not include a security process of changing      Researchers  found  an  increased  number  of  enter-
              default passwords when connecting the devices to        prises committed to staying ahead of attackers by
              the Internet."                                          understanding new and evolving cyberattack tech-
           •  Ransomware attacks targeting healthcare: Health-        niques. This improved understanding will help the
              care providers were significantly disrupted by ran-     teams anticipate criminals' next moves and defend
              somware attacks in 2016. Facilities compromised by      against new attack vectors.
              infected computer systems had to reroute patients to   •  Initiate bug bounty programs: This relatively new
              other hospitals. Major healthcare providers in Asia     approach uses crowdsourcing to reward potential
              are HIPAA compliant but are vulnerable to attacks       hackers who identify a network vulnerability or
              due to their legacy infrastructures and weak secu-      "bug." By paying the hackers to find and report vul-
              rity tools, researchers noted.                          nerabilities, organizations hope that hackers will be

              Report authors noted the importance of protecting       motivated to use their talents as a force for good.
              personal healthcare data, which many criminals
              value more than credit card information, adding,   These recommendations are consistent with Frost &
              "The healthcare industry needs a good 'cyber health   Sullivan's  belief  in  innovation  as  a  core  value  and  the
              check' before it is too late."                    cornerstone  of  every  business.  "Identifying,  developing
                                                                and leveraging innovation will give your company a
           •  Drone attacks: Mainstream consumer adoption of    competitive edge and solidifies your company's long term
              drone technology has made drones affordable and   success," the company stated.

                                                                                                                13
   8   9   10   11   12   13   14   15   16   17   18