Tips and Tricks of staying Cyber Secure while doing WFH

On one hand, while the world is struggling with the pandemic COVID-19, another struggle is going on. Offices are now vacant and people are working from home. Employees do matter and so does the business. This is the reason behind the worldwide active adoption of ‘work from home’ culture.

However, work from home culture has its own drawbacks. Offices are secured with strong cyber security infrastructure along with a dedicated security team that monitors suspicious activities. Even after such stringent monitoring, cyber attacks still occur on organizations. One can imagine how vulnerable cyber security becomes when employees work from home.

21 security tips for working from home during COVID-19

In research conducted for the month of February and March, it was realized that there was a whopping 600% increase in cyber threats related to the COVID-19 pandemic40% of companies which enabled work from home policy for employees reported an increase in cyberattacks.

Simple Security Measures for Employees to Safely Work from Home

 

1. Provide cyber security awareness to employees

Employees must be provided with the knowledge to identify cyber-attacks such as awareness against phishing emails, risks associated with the use of public Wi-Fi, to ensure the security of the devices being used for work.

2. Secure medium of communication

Always use a secure medium of communication for official purposes. Make sure that security protocols such as DMARC are set in your email domain to secure it against any attempt of spoofing or abuse.

3. Deploy a phishing incident response team

In such a critical time when businesses are being hit hard, neglecting security can be an extremely dangerous situation for any organization. Every single effort matters and each form of vulnerability has to be taken into consideration. Since the majority of cyber attacks occur via emails. Therefore, a Phishing Incident Response tool is the need of the hour. A single vigilant employee can save the entire organization. A phishing incident tool empowers employees with the capability to report suspicious emails.

What is an Incident Response Plan and How to Create One | Varonis

4. Deploy a VPN

Deploy a VPN for secure data transfer between the core system and work systems that employees are using remotely. It adds on as an additional layer of security by encrypting data while travelling.

How does a VPN work? - Namecheap

5. VDI

Virtual desktop infrastructure (VDI) allows employees to work in a virtual environment as if they are connected to company’s local network from any place, at any time and from any device that is connected with the Internet. With VDI, data is stored on a server rather than the individual system. Not only does it significantly lower down risks to data but also, a lesser amount of bandwidth is required to store it.

6. Encourage employees to use cloud services

Encourage employees to use cloud services like doc, spreadsheet, etc. since this minimizes the risk to data as it is not stored locally.

7. Deploy an MDM solution

What is Mobile Device Management (MDM)?

Deploying an MDM solution helps the organization in retaining control over business-related sensitive data. The solution allows administrators to remotely lock the devices and wipe all the data in case the device gets stolen. This prevents sensitive data from falling into the wrong hands.

Do You Want to Keep Your Organization Secure?

We are providing a 30-day free cyber health checkup for your organization. This will consist of free cyber security consultation and solutions including:

  • SaaS-based email authentication and anti-spoofing solution KDMARC
  • Anti-phishing, fraud monitoring & take-down solution KPMonitor
  • Phishing incident response tool TAB
  • Risk detection & threat analysis and
  • Code risk review.

Let’s pledge to support each other in these difficult times and make sure that the human race survives and thrives once again!

Security Awareness Training: Key Advantages

The year 2020 has been the most unpredictable and tough year for each one of us. The first quarter itself included lots of mishappenings and unforeseen scenarios, leaving every country across the globe on alert mode! The pandemic not only affected many lives but also flipped day-to-day routines, bringing everything to a halt at a certain point where none of us were sure of how to bring things on track.Although, eventually, everything started to change rapidly, including how we work, communicate, or even interact with one another remotely. The major impact of the COVID-19 pandemic was almost on every industry and its verticals, including private and public organizations. Every working individual was mandated to work from home, ensuring to prioritize their health security, but unfortunately, it resulted in leaving cyber security highly vulnerable.

After the coronavirus, cyber security became one of the significant topics of concern in the first quarter of 2020. With organizations adopting the ‘work from home’ policy, cybercriminals found the situation as a golden opportunity to deploy cyber attacks more aggressively. Lately, many organizations have fallen victim to massive cyber attacks and high-end data breaches, resulting in the exploitation of confidential data and online theft of millions of users’ credentials.

In fact, hackers have been taking control of several networks, locking away the data of the organization, and demanding an excessive ransom to return back their data. On seeing the criticality of the situation, it is impossible to set up a secure IT infrastructure like that of an office at home. But it is possible to stay proactive and cyber secure by taking preventive measures to mitigate future cyber risks.

Organizations must consider providing security awareness training to their employees in order to help them have knowledge of all possible cyber threats while working from home and how to combat them. Let us proceed further to learn more about security awareness training and how it is beneficial for employees.

What is Security Awareness Training?

Security awareness training is formal training to educate employees about computer security. This practice of training employees includes educating them about corporate policies and working procedures with information technology. The main purpose of this training is to help employees become familiar with cyber attacks, data breaches, and all types of social engineering practices.

But the ultimate purpose of this security awareness training for employees is to teach them about the value of data as a corporate asset in the organization. A proper and effective security awareness training keeps employees engaged and interested in following the directives. The motive is to ensure that employees do not get indulged in handing over confidential information to any unauthorized person or do not commit mistakes that might help hackers to get unauthorized access into an organization’s restricted network.

More importantly, security awareness training helps in influencing the behavior of employees, reducing cyber risks, and ensuring compliance within the organization. This corporate security awareness training program is currently the best method to encourage cyber security awareness among employees while they are working from home.

According to a study by a security research lab, human error is the most common cause of 95% of cyber security breaches. It also stated that if somehow this human error is eliminated completely, 19 out of 20 cyber breaches might not happen at all in the first place. The Information Security Awareness Officers of every organization must consider planning and implementing proper security awareness training for employees.

 

How is Security Awareness Training Important for Employees?

While corporates are seeking digitals assets to mitigate cyber threats, it is important to understand that the biggest threat lies within the organization itself. Humans are the most vulnerable resource and the weakest link in the cyber security chain. They are easy targets of hackers as they can be easily manipulated due to psychological flaws. Recently, 60% of UK businesses fell victim to cyber attacks and data breaches because of human error, resulting in bringing their business to a halt for days.

This is why implementing cyber security awareness training among employees is highly important for every organization. Just by strengthening the weakest link in the cyber security chain, an organization can mitigate up to 90% of cyber risks. Moreover, the following benefits of security awareness training will definitely make you understand the importance of the purpose:

  • Cyber Resilient Working Environment

The security awareness training program develops a sense of responsibility within employees to work in a security-focused environment. When you offer training to employees, they automatically understand the importance of the topic being taught and learn how it has to be practiced in the future. Regular training helps in instilling better habits of staying cyber aware and secure.

  • Prevent Breaches and Cyber attacks

Without this security awareness training, employees wouldn’t have stayed updated on cyber attacks and malicious activities of hackers. So when employees learn how to recognize and avoid these attacks, they start using preventive measures in order to keep the organization’s network secure and maintain the workflow.

  • Robust Technical Defenses

Technological security defenses play a valuable role in safeguarding organizations from the reach of cybercriminals. But these defenses require manual labor to operate, update and upgrade security software which is only possible with proper security awareness training. These technological defenses become useless if they are being operated or updated without full knowledge.

  • Proactive Employees

One of the biggest benefits of corporate security awareness training is to help employees become proactive and confident about working around data, without causing any incident. After all, human error is the leading cause of cyber attacks and data breaches. With effective training, employees become empowered to work in a cyber-resilient environment, reducing the chance of human error.

  • Gets Everyone in Sync

Every security practice must be followed in sync, keeping every employee on the same page in the organization. Without official training on cyber security, all different departments in the organization might be practicing different principles, keeping data on the verge of risk.

This is why official security awareness training sessions are important to remove all guesswork when it comes to security and make every working individual follow the suit to mitigate security threat postures.

Let us not stay vulnerable by encouraging cybercriminals to take advantage of the pandemic and lockdown. Cyber security is a two-way street where we have to keep up with the advanced security tools to combat and mitigate cyber risks.

Centrality of Cyber Security in the Educational Sector

Over the last few years, the education sector has become a new favorite target among cyber criminals. From turbulent ransomware attacks to covert data breaches, numerous academic institutions have suffered from various kinds of cyber attacks in recent times.

The introduction and adoption of newer technologies along with the disruption caused by the COVID-19 pandemic have fueled the situation further. Cyber criminals are attacking educational institutions with tactics and tools that have worked effectively against businesses.

Why has the Education Sector Become a Lucrative Target?

Why Cybersecurity Needs To Be a Priority for The Education Sector

According to an article by CSO Online, the education sector accounted for 13% of all data breaches in the first half of 2017, which resulted in the compromise of approximately 32 million records!

 

Here are the major reasons for the popularity of the education sector as a target among cyber criminals:

1. Financial Gain: According to research, educational records are worth up to $265 on the black market. The notion of such huge financial gain is more than enough for threat actors to target academic institutions.

2. Valuable Data: Even though educational institutions may not look as lucrative as healthcare companies or private businesses, they serve as a treasure trove of sensitive financial and personal information including valuable proprietary research data.

3. Espionage: Espionage is another reason for cyber criminals to target the education sector. Higher education institutes such as universities and colleges often serve as centers for research and possess valuable intellectual property.

4. Impacting Operations: Several attacks on academic institutions have been carried out with the motive of causing widespread disruption and adversely affecting the institute’s productivity.

Major Cyber Security Threats to the Education Sector

The Top 5 Cybersecurity Threats to Schools (And How You Combat Them) - Enterprise Training Solutions Blog

A wide range of cyber threats has been plaguing the education sector for years. Here are the top threats hounding educational institutions around the globe:

 

1. Spear phishing Attacks: Using spear phishing, cyber criminals have taken hold of several academic institutions, resulting in catastrophic losses. An article by Business Line reported that more than 1000 colleges, schools and universities were targeted by various spear-phishing campaigns in Q3 2020.

 

2. BEC Attacks: Threat actors have also resorted to BEC attacks for targeting organizations in the education sector. The same article by Business Line also reported that Gmail accounts serve as the primary medium for launching the majority of BEC attacks, accounting for 86% of all BEC attacks on academic institutions.

 

3. Ransomware: As per the FBI, schools have become the most popular targets for ransomware attacks. A number of colleges, schools and universities have been hit by vicious ransomware attacks, leading to devastating consequences.

4. DDoS Attacks: DDoS attacks or Distributed Denial of Service attacks are very common in the education sector. These attacks offer an easy way for cyber criminals to disrupt operations, especially if the network of the target organization is poorly protected.

 

5. Data Breaches: Since academic institutes hold a huge cache of valuable information, data breaches have always been common in the education sector.

Recent Cyber Attacks on the Education Sector

As mentioned above, many educational institutions worldwide have been hit by cyber attacks in recent years. Here are some major cyber attacks witnessed by the education sector over the last couple of years.

 

1. In March 2021, the London-based Harris Federation suffered a ransomware attack and was forced to “temporarily” disable the devices and email systems of all the 50 secondary and primary academies it manages. This resulted in over 37,000 students being unable to access their coursework and correspondence.

Sophisticated Ransomware Attack leaves 36,000 Students without Email

2. The Division of Structural Biology at Oxford University fell victim to a cyber attack in February 2021. It was involved in extensive COVID-related research and access details for several of its systems were spotted online.

3. The University of Northampton was hit by a cyber attack in March 2021 that led to the disruption of its telephone and IT systems and servers.

4. The University of California, San Francisco paid a ransom of $1.14 million after the NetWalker ransomware locked down multiple servers of its School of Medicine in June 2020.

5. Birmingham college was hit by a ransomware attack and had to ask all of its 20,000 students to stay at home for a week. It had not even been two weeks since they had returned to the college following an extended lockdown due to the COVID-19 pandemic.

All hell broke loose': How a cyber attack shut a college

How to Protect Educational Institutions Against Cyber Attacks?

Whether it is due to the lack of resources and budget or the absence of stringent security policies, academic institutions have been unable to protect themselves against cyber attacks in the past.

 

With a myriad of cyber security issues hounding the education sector, it is about time for these institutions to take the appropriate precautions and get ahead of threats. So, here are some effective measures you can take to shield an educational institution against cyber threats.

 

1. Implement a robust Identity Access Management (IAM) system to prevent anyone from obtaining unauthorized access to the network.

What is Identity Access Management? | Varonis

2. Conduct periodic Vulnerability Assessment and Penetration Testing (VAPT) to detect and fix any exploitable vulnerabilities in your organization’s cyber security infrastructure.

 

3. Enable Multi-Factor Authentication (MFA) on all the applicable endpoints across the enterprise networks to add an extra layer of security to your organization’s cyber security framework.

 

4. Train all the employees in the basics of cyber security to generate awareness about various cyber threats and the best ways to deal with them.

5. Enforce cyber security best practices like a strong password policy. Make sure your employees are aware of the consequences of not following the practices and understand their responsibility in keeping the organization safe.

 

Cyber security in the education sector is essential for about a hundred reasons, the most important one of them being to ensure the safety and privacy of students. So, take the necessary measures now and keep your organizations protected against cyber threats.

 

Healthcare Cyber Security growing Paramountcy

Over the last year, the healthcare industry has become a target of strategic interest amongst cyber criminals. Owing to its troves of valuable data, healthcare has never been as vulnerable to cyber attacks as it is now. As per a report by HIPAA Journal, healthcare institutions reported 616 data breaches of 500 or more records in 2020. Moreover, the report also revealed that 28,756,445 healthcare records were exposed.The Role of Cybersecurity in Healthcare and Hospitals | Norwich University  Online

With the arrival of the COVID-19 pandemic, hackers rapidly evolved their tactics to exploit the fears escalating amongst the population. This has spurred the need to adopt cyber security best practices for keeping pace with evolving threats, especially in healthcare. Cyber criminals have reframed their phishing attempts to launch targeted cyber attacks by taking advantage of the COVID-19 fears.

Those working on the response have become prime targets. Even the World Health Organization (WHO) and the research firms developing treatments and vaccines for the coronavirus are being targeted. Moreover, as per Becker’s Hospital Reviewdata breaches cost the healthcare industry nearly $5.6 billion every year.

 

Major Cyber Attacks on the Healthcare Industry in 2020

It’s widely believed that in 2021 the healthcare industry will continue to be the most targeted industry by cyber criminals. Here are some major cyber attacks targeting the healthcare industry in 2020:

 

  1. The year 2020 witnessed the first fatality due to a ransomware attack when a hospital in Germany was hit by a ransomware attack in September.
  2. The UK National Cyber Security Centre (NCSC) reported that APT29 targeted COVID-19 vaccine development.
  3. The Universal Health Services (UHS) health system suffered a ransomware attack across its 400 locations in September.
  4. Data allegedly stolen from five different healthcare entities was posted for sale on the dark web by the hacking groups behind REvil, SunCrypt, NetWalker and Pysa or Mespinoza ransomware variants.
  5. UCSF paid a ransom of $1.14 million after the NetWalker ransomware affected multiple servers of its School of Medicine.
  6. In October 2020, DHS CISA issued a warning of an Emotet resurgence, problematic ransomware that has targeted 24% of the most prominent hospitals.

 

How to Protect Healthcare Institutions Against Vicious Cyber Attacks?

With the pandemic expected to continue into the foreseeable future, the healthcare industry is hounded by several cyber security issues. Cyber attacks on healthcare facilities can have consequences beyond breach of privacy and financial loss.

 

Therefore, it has become essential for these institutions to take the necessary precautions and get ahead of threats. Here are a few effective cyber security measures that can offer protection against the cyber threats plaguing the healthcare industry:

 

Enable Multi-Factor Authentication (MFA)

Implementation of MFA on all the applicable endpoints across the enterprise networks is an effective way to get rid of some of the most disastrous vulnerabilities. According to a report by Microsoft, enabling MFA can block over 99.9% of all automated account compromise attacks. With billions of stolen credentials for sale, it has become extremely important to adopt MFA as a basic security protocol. This applies not just to the healthcare industry but everywhere.

 

Vulnerability Management

Cyber criminals often exploit unpatched vulnerabilities in the IT infrastructure of their target organization to ensure the success of their attempt. Hence, it is imperative to make sure that all the security patches are updated regularly. Overlooking even a minuscule vulnerability in your organization’s security framework can have severe ramifications. Conducting periodic Vulnerability Assessment and Penetration Testing can significantly help you keep your company’s IT infrastructure free from any weaknesses, mitigating the risk of suffering a cyber attack.

 

Generating Awareness

Educating your staff about cyber risks and the ways to mitigate them is one of the most effective ways of meeting the challenges posed by the current cyber threat landscape. If every individual on staff is vigilant enough, it will be difficult for the threat actors to find an opening for an attack. Organizations can use innovative cyber security awareness tools like ThreatCop to train employees in the art of avoiding cyber attacks.

 

Backup Storage and Restoration

The best way to minimize damage caused by a cyber attack is to employ backup, offline storage and restoration. This standard security protocol is especially effective against ransomware attacks. If you are unable to prevent a cyber attack from hitting its mark in the first place, it is essential to have a plan. The next best course of action is to ensure that you have a reliable offline storage and restoration option.

 

To summarize, cyber security in healthcare is not just about protecting an organization but also protecting those they serve. Consequently, it is extremely important for healthcare providers to enforce strict security policies and keep evolving them according to the changing cyber threat landscape.

 

Indian Banks mounting Online Frauds

With the significant rise in the use of digital systems over the years, there has been a rapid increase in cyber frauds around the world. Cyber criminals have grown much more sophisticated, making it more complicated for organizations to defend themselves against cyber threats.

As technology advances, we rely even more heavily on the internet today. Everything we do can be done online including work, entertainment, shopping, and banking. The internet has made doing everyday tasks considerably easier.

Indian Bank frauds: Why bankers are hesitant to report frauds

However, it has also led to a drastic rise in cyber crimes around the globe. Seeing how Indians have started doing online banking transactions more now, the number of online banking frauds in India has increased substantially.

 

According to the RBI’s annual report, bank frauds of ₹100,000 and above have more than doubled in value to ₹1.85 lakh crores in FY20 as compared to ₹71,500 crores in FY19. Also, the number of such cases has increased by 28% in the same period.

 

However, the financial sector has been putting consistent efforts to secure the systems and users. But malicious actors are duping people over the internet by various means to steal their money or sensitive information.

 

Reports on Recent Online Frauds in India

According to a report by Hindustan Times, India has lost a total of  ₹615.39 crores in more than 1.17 lakh cases of online banking frauds from April 2009 to September 2019. The occurrence of these frauds is spread over a decade. But the banking industry is witnessing a significant rise in the number of online banking frauds.

 

There was a concentration of large value frauds, with the top 50 credit-related frauds constituting 76% of the total amount reported as frauds during 2019-20. Incidents relating to other areas of banking, like an off-balance sheet and forex transactions, fell in 2019-20“, said RBI.

₹129 crores have been lost in just the last three months of 2019 and a total number of 21,041 such cases were registered in these three months”, said Anurag Thakur, MoS, Ministry of Finance in Lok Sabha in reference to a recent online fraud in India.

Cyber Frauds In The Indian Banking Industry

How to Prevent Online Banking Frauds?

Consumers aren’t the only ones facing online fraud. With the increasing number of data breaches and fraudulent emails targeting retailers and organizations, businesses are increasingly at risk of online fraud.

 

Becoming a target or a victim of such fraud does not only bring disruption to business operations. It also causes the organization the loss of customers’ trust, brand reputation and sensitive data.

Online banking fraud: 7 tips to ensure fraudsters can't swindle your money | Online News – India TV

So, it is critical that organizations adopt certain cyber security measures to avoid learning an expensive lesson, which can often lead to more grievous consequences.

Best practices to Prevent Online Banking Frauds:

 

  • Keep financial data separate

Organizations must use a separate system dedicated to performing financial transactions and backing up the data in an external drive regularly. Moreover, restrict or limit access to financial information and data.

 

  • Know who is asking

Banks never ask for personal information over the telephone, emails, or text messages. Therefore, avoid sharing PINs, passwords, or your organization’s financial information without proper verification.

 

  • Keep it secret and safe

Create a strict password policy to avoid the risks of password sharing at work. Also, never leave files containing access to the financial information in an unsecured place. Moreover, make sure to always leave your computer locked when unattended.

 

  • Manage user authentication

Restrict email address/IP locations to allow only authorized users to make transactions on behalf of the organization. Make purchases only on authorized and legitimate websites and review the organizational financial statements regularly.

 

  • Cyber awareness training

Educate employees about cyber security awareness. It helps in simulating cyber attacks to check the number of vulnerable employees in your organization and train them accordingly.

 

Providing this training makes the employees familiar with the attacks and give them the knowledge of what needs to be done when such attacks occur.

 

Where to Report Online Frauds in India?

In case you failed to take the precautions and become a victim then it is urged to immediately register a complaint with the local police or cyber crime authorities.

 

Also, the moment you realize that a suspicious transaction has been done from your bank account or your debit/credit card, inform the respective bank immediately.

 

Scams and online banking frauds have been constantly evolving and rapidly increasing over the years in India. Organizations should come up with more comprehensive and complex cyber security measures to protect the business and the customers.

 

Moreover, every industry should embrace a culture that following cyber security protocols is not a necessity but mandatory.

 

Banking Industry: A witness of Cybersecurity Challenges

Cybersecurity attacks are evolving, getting more sophisticated, more frequent, and spreading worldwide. It seems like not a day is passed without an organization suffering a data breach or a customer of a bank losing money from the account through stolen credentials.

While most industries worldwide are affected by the imminent peril of cybersecurity threats, the banking industry is one of the prime targets. After all, the sector deals with what the attackers want the most, ‘money and personal information’.

 

Cyberattacks: The Roaring Trade

Cyber Threats To The Banking Sector To Watch Out For | ClaySys

Cyberattacks on financial firms have become a flourishing money-making business for cybercriminals. As per the report from a cybersecurity firm’s research, cyberattacks against banks spiked by a massive 238% from the beginning of February to the end of April 2020.

 

In 2017, financial firms saw the highest volume of cybersecurity attacks over any other industry. This threat landscape is widening as it is getting more sophisticated and diverse. The annual cost of cyberattacks in the banking industry has reached $18.3 million per enterprise.

 

We have witnessed cybersecurity attacks making headlines for several years. Some of the most headline-making cyberattacks have been the DDoS attacks. These attacks flood customer-facing bank websites with traffic and take them offline or attacks on the Swift based money transfer systems, among others.

 

We have also witnessed big banks suffer these attacks over a decade. Recently, hackers stole $81 million from the Central Bank of Bangladesh. In fact, last month, a powerful DDoS attack struck Hungarian banks and telecom services. It was the most powerful and one of the biggest cyberattacks Hungary had ever encountered.

 

As fast as the organizations are adopting new-age technologies, hackers are constantly finding ways to penetrate and target exploitable security vulnerabilities. Thus, making it evident that cybersecurity attacks are increasing rapidly every passing year.

 

A Strong Barricade For The Assets

Banks not only store money but also gather network activities and personal information of the customers. Information that includes names, phone numbers, addresses, email addresses, and dates of birth. This data has inherent value and can be used for other malicious activities such as identity theft, which can often lead to more disastrous and grievous consequences.

Addressing the cyber attacks faced by financial services firms?

In today’s world, cybercriminals are getting advanced with modern technologies. They develop custom-built malicious code that is not necessarily picked up routinely by antivirus protection. So it is very important for the sector to address the modern times demand.

 

The banking industry needs to realize the assets they have in store and what mechanisms might be used by attackers to get into their organization. They need to identify the weak points and the measures needed to strengthen the IT infrastructure, based on the risk assessment to defend against those potential threats.

 

It is high time to shift from passive cybersecurity to active cybersecurity, which is switching from what is largely reactive to embracing the white hacker to test the strength of IT infrastructure security. Regardless of how sophisticated the attack is, it mostly starts by trying to trick the employees into doing something that jeopardizes the system.

 

Therefore, the industry should not only focus on the systems but also get the employees to take the measurements to defend the loophole. Making the employees understand the approaches that these attackers take and what can be done to minimize the exposure to that risk.

 

According to a report by Deloitte India, cybersecurity attacks are getting complex each passing day and to prevent these threats banks will also need to hire Chief Risk Officers. The officers who are experienced in taking responsibility and lead the firm with military-level cybersecurity solutions to identify the modern sophisticated cyberattacks.

 

Having a CRO (Chief Risk Officers) will help the firm in managing the operations to prevent cybersecurity threats. It can also fill the responsibilities, including identifying, evaluating, reporting the threats and monitoring the external and internal cyber threats to the firm.

 

Methodology For Mitigating The Threat

It’s about time for financial firms or any industry to stop relying on the obsolete IT infrastructure. Instead, they should adopt cybersecurity measures that are more complex and sophisticated than ever before to prevent prevailing and emerging cyber threats.

 

Here are some basic steps the financial firms can implement to minimize the risk of a cyberattack:

Cyber risk management in consumer business | Deloitte Insights

  • Identify and classify the assets- It is important to identify and categorize the information assets, based on its level of sensitivity, value, and criticality to the bank. Information assets including various categories of data that are highly-restricted, confidential, internal use, and the public.
  • Risk assessment- It is advisable for every bank to prepare a cybersecurity risk assessment, and implement a cybersecurity protection plan to address those threats identified in the risk assessment procedure. This helps the organization to mitigate the factors that cause disruption in running a smooth business operation.
  • Identify threats and vulnerabilities– Threat and vulnerability can be subjected to a person, an organization, weaknesses in the system or the network. So it is not a necessity but mandatory for the organization to identify these threats and vulnerabilities through penetration testing in order to patch the weaknesses that can be exploited to gain access and affect the system.
  • Analyze risk- As mentioned earlier, the bank has the assets that the hackers sought for. So, analyzing the risk to these assets based on the impact or criticality is a way to go for an organization. The process should occur on a regular basis to identify any new potential threats.
  • Educate employees- All employees should be aware of the threats and consequences of ignoring it. For instance, they should be aware of the hazard by clicking a malicious link or opening an attachment from an unknown person. So, it is crucial to provide cybersecurity awareness training for the employees with tools that helps in raising awareness to prevent cyberattacks. It is particularly important because most of the cyber incidents are the result of  “human error.”

All you need to know about the risk of Cryptojacking

Cryptojacking has provided cybercriminals with a new means of filling their pockets at the expense of organizations around the world. And the worst part? Your company may already be a victim of cryptojacking and you might not even know it!

 

What is Cryptojacking?

 

Cryptojacking refers to the unauthorized use of someone’s computer for mining cryptocurrency. As cybercriminals keep coming up with new ways of attacking businesses, cryptojacking has become one of the most rapidly growing cyber attack vectors globally.

 

Instead of holding your company data for ransom or stealing it, threat actors can tap into your organization’s computing power for mining cryptocurrency. The theft of your organization’s computing power through cryptojacking can have tangible financial consequences.

 

It can lead to the potential degradation in service, loss of income and productivity, higher cloud usage or energy consumption, frequent replacement of hardware and system performance issues.

 

How does Cryptojacking Work?

 

Cryptojackers trick victims into clicking on a malicious link that loads cryptomining code on their computer. Alternatively, they can infect an online ad or website with JavaScript code that executes automatically once it is loaded in the victim’s browser.

 

However they do it, the cryptomining code works silently in the background while the unwary victims continue to use their computers normally. Hackers often use both these methods to maximize their return.

 

Unlike the other kinds of malware, cryptojacking does not damage the computers or their data. It steals CPU processing resources. Individual users may find slower computer performance just a little annoying, however, organizations with several cryptojacked computers can suffer severe financial losses.

 

How Prevalent has Cryptojacking been in 2020?

 

  • Varonis discovered the Monero cryptojacking malware while investigating a company that was secretly plagued by cryptojacking for over a year. This was one of the biggest recent cryptojacking attacks.
  • As per CSO Online, 90% of all remote code execution attacks are linked to cryptomining.
  • According to a report by Digital Shadows, cryptojacking kits are being sold for as little as $30 on the dark web.
  • According to a report by arXiv, cryptojacking is responsible for 4.32% of all Monero in circulation.
  • As per a report by ENISA, 2020 witnessed a 30% year-on-year increase in cryptojacking the month of March.

How to Detect Cryptojacking?

Cryptojacking is one of the stealthiest and most difficult-to-detect cyber attack vectors. It can not only have an adverse impact on your entire business operation but can also make it difficult for you to identify which of the systems have been compromised if any.

So, here are a few major things you should keep your eye out for:

 

Deteriorating System Performance

A decrease in the performance of your computing devices like laptops, desktops, tablets, and mobile devices is the first symptom of cryptojacking. Instruct your employees to immediately report any fluctuation in their system’s performance to IT.

Quick Overheating

Mining for cryptocurrencies is a resource-intensive process, which can cause your computing devices to rapidly overheat, resulting in system damage. A problem may be indicated if the fans of your systems are running longer than they normally do to cool down the system.

Increasing CPU Usage

Regularly monitor and analyse the CPU usage of your systems. If you spot an unreasonable increase, it may be a sign that cryptomining scripts are running on your system without your knowledge.

Undo Changes on Webpages

Cybercriminals are always on the lookout for websites where they can insert a cryptomining code. Frequently monitor your own websites to look for any changes to the webpages or the files on the web server.

 

How to Mitigate the Risk of Cryptojacking?

 

It is extremely difficult to detect if and when your computer systems have been compromised by cryptojacking. However, you can take some basic preventative measures to protect your systems and networking systems against this threat. Here are some effective tips to prevent cryptojacking:

 

  • Train Your Organization’s IT Team

Make sure your IT team is satisfactorily trained to detect and understand cryptojacking. It should be aware and vigilant enough to catch the earliest signs of an attack and should be ready to take immediate steps to get the situation under control.

  • Implement Anti-Cryptomining Extensions

Implement one of the many available browser extensions for blocking the cryptominers across the web.

  • Disable JavaScript

Disable JavaScript while browsing online to prevent the cryptojacking code from infecting your system.

  • Use Ad Blockers

Cryptomining scripts can be often found embedded in web ads. Use an ad blocker to detect and block any malicious cryptomining codes.

  • Educate Your Employees

The IT team is not solely responsible for securing the organization against cyber threats. Each of your employees should know what to look out for. Provide your employees with basic cybersecurity awareness training to make them understand the importance of following security protocols set by the IT team.

Instruct your employees to immediately notify IT if their systems are overheating or running slowly. They should also know about the risks involved with clicking on suspicious links or downloading files from untrustworthy sources.

Ransomware attacks: 40% surge in Q3 2020

This year cyber attacks have increased many folds as compared to previous years due to new security challenges caused by the Covid-19 pandemic. The third quarter of the year has seen a huge surge in ransomware attacks. Globally, a total of 199.7 million ransomware attacks have been reported in the third quarter of 2020. 

According to cyber security experts, ransomware attacks have increased 40% to 199.7 million cases globally in Q3 of this year. Below we have mentioned some staggering statistics which will give you an insight into the present situation:

  1. The US observed 145.2 million ransomware hits in Q3, which is a 139% year-over-year increase.
  2. The cyber security researchers have detected new ransomware, Ryuk, with 5,123 attacks in just Q3 2019.
  3. Ryuk ransomware attacks have increased to 67.3 million in Q3 2020, which is 33.7% of all ransomware attacks this year.
  4. Though ransomware attacks have gained pace this year, malware attacks have fallen significantly. Cyber security researchers have recorded 4.4 billion malware attacks in a year-over-year comparison through Q3 – a 39% drop worldwide.
  5. The experts have detected a 30% rise in IoT (Internet of Things) malware attacks with a total figure of 32.4 billion attacks globally.

 

The above data shows a considerable decrease in malware attacks but that does not imply the disappearance of malware attacks. Because, this is just a recurring downturn that can easily adjust itself in a short amount of time, as per a cyber security report.

SCYTHE Library: Don't Get Comfortable Yet - The Declining Fear of Ransomware

The Strategy Behind Ransomware Attacks

 

Ransomware is a form of malware that is installed into victims’ computers through malicious emails. It encrypts the victims’ data for which victims need the decryption key. The cyber attackers demand ransom, which can range from a few hundred dollars to thousands, payable in Bitcoin, for the decryption key.

 

There are a number of attack vectors through which ransomware can gain unauthorized access into victims’ databases. One of the most prominent ways used to access victims’ computers is phishing emails and email attachments. Cyber criminals make these emails look trustable and trick the users to open them. Once these emails are opened and attachments are downloaded, the attackers take over the victims’ computers.

Five Protective Actions Against Ransomware Attacks

Possible Best Buy Breach In [24]7.ai Hack | PYMNTS.com

By following essential preventive measures, you can easily keep the ransomware attacks at bay. All you need to do is to be careful about what you perform on your computer. Let’s walk through some “must follow” cybersecurity practices:

  1. Avoid clicking untrustable links: Never click on suspicious or untrustable links, attached in unsolicited emails.
  2. Build your data-backup: Create a separate data-backup in an external hard drive that is not connected to your computer, so that you don’t have to pay the ransom if a ransomware attack happens.
  3. Don’t disclose your personal information: Never disclose your personal information if you receive any call, text, or email which is asking for your personal details like banking information or any account information. Always verify the source of those contacts as cybercriminals steal personal data first to misuse it for malicious campaigns or financial frauds.
  4. Use content scanning and filtering software: It is advisable to use content scanning and filtering software on your mail server to prevent a ransomware attack. The software helps in reducing the likelihood of a malicious email reaching your inbox.
  5. Security awareness program for employees: As an organization, you would always want to secure your confidential data from all types of cyberattacks. Therefore, it is important to conduct a cyber security awareness program among employees that will disseminate detailed knowledge of attack vectors and how to reduce the chances of ransomware attacks.

Next Big Threat? – Polymorphic Attacks

During the first half of 2020, cybersecurity analysts and security experts have discovered that most of the phishing attacks conducted through the use of spoofed login pages. Polymorphic phishing attacks are on the rise in recent times as hackers are coming up with new ways to create spoofed login pages that are almost unidentifiable. This is one of the most frequently used methods implemented by cybercriminals for stealing the credentials of employees and users.Researchers have disclosed that more than 50,000 spoofed login pages replicating 200 popular international brands have been circulating since 2019.

This sudden increase in the number of polymorphic phishing attacks is because spoofed login pages are extremely difficult to identify but are comparatively easier to generate by hackers. Automated phishing kits that are illegally sold over the dark web, are deployed by cybercriminals to instigate these malicious phishing campaigns and to trick employees on a wider scale. This is why phishing awareness and training has become absolutely imperative in organizations in the 21st Century. As a CISO or CIO of your company, taking adequate precautions to prevent polymorphic phishing attacks is the need of the hour.

All you need to know about Polymorphism 

In a polymorphic phishing attack, attackers usually make minor alterations in the sender ID of a valid source or spoof an email address. They use social engineering attack techniques to make sure that the spoofed email ID replicates the authentic ID. The hackers then send these malicious emails to the employees in reputed organizations. More often than not, the email lands into the inbox of employees due to the lack of proper email authentication protocol in the company.

This malicious email comes with a link or attachment that redirects the employee to a spoofed login page. The login page asks for the employees’ corporate credentials and passwords. Ill-informed and unaware employees can easily fall for such polymorphic phishing attacks and give up their company login credentials on the spoofed page.

This information is used by hackers to extract valuable data of the company, gain access to company assets and financial information, find out personal details of employees working in the company, and conduct other fraudulent activities.

42% of all phishing attempts in 2020 were as a result of Polymorphism, as per a global survey conducted by security researchers.

According to security officials around the world, while these login pages are fraudulent in nature, they look extremely similar to original webpages. This is why cyber attackers use Polymorphism techniques to phish employees via spoofed login pages and succeed at it.

A cybercriminal can make minuscule changes in the email address so as to replicate a popular brand as closely as possible to skip detection. Since the changes made are very minor, such emails easily evade email security checkers, and email security tools may fail to detect them.

The most probable reasons for the increase in the number of spoofed login pages may be due to the following two reasons:

  • CISOs, CIOs, and SOC analysts of the reputed brand whose landing page has been spoofed seek ways for taking the fake pages down. This makes the hackers create more new pages so that it can continue to spoof employees.
  • Certain brands or companies may be an easy target for cybercriminals due to the lack of a well-rounded workplace security policy in their organization. This is the reason why attackers get away with polymorphic phishing attacks.

How to Detect Spoofed Login Pages?

While it may be difficult to detect spoofed login pages and prevent being phished, there are certain ways by which one can attempt to understand whether a login page is from an authentic source or not. Before being redirected to a login page it is always advisable to check whether the email is from a valid IP address as well.

This can be done by paying attention to the domain name and subdomains, as attackers might make minor changes in the same to trick employees. It also advisable to check whether the email has a relevant subject, is grammatically correct, and doesn’t provide lucrative offers or instigate a sense of urgency. After making sure of these pointers and clicking on the URL in the attachment when the login page opens up, employees must make sure:

  • While hovering over the URL it is redirecting them to the desired page
  • The login page is well-designed and all the hyperlinks on the page are fully functional and redirect them to the desired pages
  • The URL of the webpage is secured over HTTPS
  • The page doesn’t ask them to disclose their corporate credentials or bank account details and password since such information should never be submitted on external platforms

Polymorphic Phishing Attack Prevention and Solution

As a CISO in your company, implementing a robust cybersecurity policy in your organization is imperative. To achieve this, security analysts may take help from the IT department and implement security solutions and tools in their respective organizations. A phishing attack awareness and training program can help employees to gain better insights on social engineering attack vectors. Proper awareness among employees can reduce the chances of polymorphic phishing attacks.

cyber attack awareness and training program starts working by simulating sophisticated impersonations of real-life cyber attacks on a company’s employees. A number of simulations are perpetrated to increase security awareness.

After this, the training procedure is initiated, by imparting knowledge on the various types of attack vectors. This is done through awareness content giving detailed insight on them, visual presentations on attack identification, as well as video lectures and advisories on the same. Regular cumulative assessments are then taken to ensure improvements and initiate a better response against attacks.

Detailed analysis of simulation reports is provided to track results and monitor progress made via assessments and knowledge imparting sessions taken by employees.

In order to prevent employees from falling prey to phishing attacks, it is imperative for CISO and security officials to implement AI-driven cybersecurity solutions. By upgrading your workplace cybersecurity policy and implementing leading-edge cybersecurity solutions in your company, it is possible to ensure protection against polymorphic phishing attacks.

Why Organizations should conduct cybersecurity assessments

Information Security Audit and Self – Assessment Frameworks for operators of essential services and digital service providers — ENISA

The past year was filled with news about cybersecurity, including phishing scams, ransomware, and new attack methods. And this year, security experts again predict even bigger attacks and smarter hacks that will be met with heavy fines slapped on regulated organizations for not preventing or minimizing a breach on their watch.

Adhering to compliance standards and finding gaps in data security is a multi-faceted process that requires a holistic approach, expertise, and vigilance. If your organization hasn’t done a self-assessment of your cybersecurity and compliance processes, or done so recently, now is the time.

Research shows that more than 56 percent of organizations reported moderate or severe impact of security challenges on their cloud computing use. Even more, reported compliance and regulation challenges. For organizations that must meet regulatory standards—like HIPAA, PCI, SOC, ITAR, FIPS or CJIS—the disruption and consequences in the event of a breach can cost more than they are worth in fines, a tarnished reputation and remediation efforts.

After working with hundreds of organizations on their compliance and data security processes, I’d like to share five key benefits of a cybersecurity self-assessment.

A cybersecurity self-assessment can help your organization:

1. Measure security risks objectively across teams and roles

Risk and Performance Management. Risk measurement quickly raises… | by Ryan McGeehan | Medium

Even the most brilliant and passionate IT teams, partners and vendors can sometimes become myopic or defensive about their technology infrastructure and practices. And because most organizations have a variety of clouds, platforms and IT infrastructure, security exposures may not be discovered without an assessment, or worse, a traumatic event.  A self-assessment tool can offer an objective lens from which to have critical conversations across teams and roles.

2. Flag risks and exposures

74,273 Red Flag Warning Illustrations & Clip Art

From intrusion detection software to cybersecurity insurance, cybersecurity is a multi-faceted and ever-changing effort. Cybersecurity experts are in high demand, and many organizations face exposures for which they aren’t equipped to assess or internally manage. A self-assessment can be the starting point of identifying new and old areas of risk and can help you ask the right questions regarding protecting your organization.

3. Document and track security efforts

PDF & Document Security: How to Protect and Track PDFs and Documents Securely (2021)

In the world of cybersecurity, there are no guarantees that “digital trauma” won’t strike. That’s not the reality of today’s world. However, multiple layers of security processes can isolate issues in their tracks and prevent worst-case scenarios. In addition, a well-prepared organization should be able to quickly respond to multiple severity levels of security situations. Assessing your risk is the first step in developing cybersecurity and compliance efforts, documenting and training your organization around a security plan, as well as tracking progress toward remediation efforts.

4. Quickly adapt to regulatory changes

Digitally adapting to regulatory change - Risk.net

Regulations change, technology platforms evolve and teams adopt new devices, subscriptions and solutions. Your organization’s IT environment must continuously evolve to keep up with the reality of everyday business. What was a best practice a year ago may not be so today. Routine security risk assessments can help your organization stay proactive. And with the right cloud tools and controls, your organization can quickly adapt to changes in the marketplace.

5. Empower your users

Exposing a Phishing Email Attack – 5 Tips to Empower Your Users

Multiple experts cite the number one threat to cybersecurity is your colleague down the hall. The people in your organization have the most opportunity to expose your data, second to vendors with access to your systems. From proper management of user access and authentication to education around recognizing phishing emails, your users can make or break your security. Organization-wide education and preparedness are key to preventing, as well as responding, to a security event.

error: Content is protected !!