classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Threats businesses need to know about
October 2016, Cyber Security

If you’re thinking that Bring Your Own Device (BYOD), Internet of Things (IoT), cloud and the ever-faster digitalisation of business are the most pressing areas for security improvement in your organisation at the moment, I’d like to remind you that some of the most dangerous threats to enterprises come in the form of targeted attacks – including stealthy advanced persistent threats (APTs).

Andrew Potgieter, security solutions director at Westcon-Comstor Southern Africa.
Andrew Potgieter, security solutions director at Westcon-Comstor Southern Africa.

An operation comprised of a new wave of targeted attacks was recently detected by Kaspersky Lab in 30 countries globally, including the UAE and Egypt. The attacks used spear phishing and emails that appeared to come from a UAE bank to target the education, logistics, engineering, industrial, manufacturing and pharmaceutical industries.

The aim of the attacks was to collect valuable business-related data stored in the victims’ networks. Emails in these attacks came with malicious attachments and were mostly sent to the top and middle level managers of numerous companies. Kaspersky Lab dubbed the attacks Operation Ghoul due to the greedy or materialistic nature of those performing it, and reported that it is the latest among several campaigns that are supposedly controlled by the same criminal group.

Emails appeared to be 'demand for payment' letters from the bank with a document attached, which usually contained malware. The aim of these attacks? Financial gain from either the sales of stolen intellectual property and business intelligence or from attacks on victims’ bank accounts.

These attacks are proof that in the current IT climate, personal and business devices intertwine to pose new threats to users. Kaspersky Lab has reported that though this group of cybercriminals uses simple malicious tools, they are extremely effective and as such, companies are unprepared when it comes to spotting the attacks they will likely suffer.

The problem with IT security in organisations today is that although the threats and techniques that cybercriminals leverage are constantly evolving, many business are relying on yesterday’s stagnant security technologies to protect against today’s fluid threats. To be quite honest, the fact that the cost of launching targeted attacks has reduced and the inexpensive and highly effective toolsets that modern cybercriminals have at their disposal means that all businesses are vulnerable.

Aftermath

I’m sure that most managers, CEOs and CIOs have grown tired of the sensationalism so often related with cybersecurity in the media. However, to put it into perspective for you, I’d like to share exactly what an attack like this could cost you and your business in the aftermath of an APT or targeted attack.

First off, you should know that although financial gain is often what cybercriminals are after, these kinds of attacks can cost you a lot more. Loss of priceless business and customer data, disruption of businesses data, regulatory and compliance issues as well as legal action by customers, suppliers or employees are just a few of the things you can look forward to if you are affected by an APT or targeted attack.

Perhaps the worst thing that can be affected is your business’s competitive position and brand image, as these take time to re-establish. You will also suffer reactive costs to prevent further attacks that will include training to improve security department skills and users’ security awareness, staffing in terms of new job roles, segregation of duties and the on boarding of additional security experts as well as the elimination of weak points to bolster system security, remove vulnerabilities and implement targeted security solutions.

Fluid security

Targeted attacks are overseen by highly-trained cybercriminals who adapt each phase of their attack. So how exactly do you ensure that your business is ready to defend against different types of attacks at any given time? Simply put, you need a security strategy that’s underpinned by constantly evolving security intelligence.

In a world of fluid threats where you can never be too sure what will be thrown your way next, a security strategy that’s able to adapt to challenges is probably the single most valuable thing to have in your business.


Credit(s)
Supplied By: Westcon-Comstor Southern Africa
Tel: +27 11 848 9000
Fax: +27 11 848 9003
Email: marketing@westcon.co.za
www: www.za.westcon.com
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Data governance and the security industry
    June 2017, Technews Publishing, Cyber Security, IT infrastructure, Security Services & Risk Management
    So how does all the talk about data governance and data protection impact the security industry? Or does it?
  • Physical security is from Mars, IT is from Venus
    June 2017, Axis Communications SA, Cyber Security
    The days of separating physical and digital security are over. Today we need a collaborative approach to succeed in preventing and/or dealing with cyber attacks.
  • Card fraud stats 2016
    June 2017, This Week's Editor's Pick, Cyber Security, News, Security Services & Risk Management
    Credit card fraud increased by 13% from R331.4m in 2015 to R374.4m in 2016, with debit card fraud increasing by 3.1% for the same period.
  • Hikvision and Cisco collaborate on cybersecurity
    June 2017, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, News
    Cisco is sharing its professional cybersecurity management experience and technologies with Hikvision, facilitating Hikvision’s globalisation process.
  • Trusted Platform Module explained
    May 2017, Bosch Security Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.
  • Procore Trading
    Securex 2017 preview, Cyber Security
    Procore Trading’s Intimus 9000 Degausser uses most modern APT technology to erase information from hard drives. The Intimus 9000 produces an erasing field many times stronger than those produced by the ...
  • Security skills shortage?
    May 2017, Galix Networking, Cyber Security
    We’re currently faced with a global information security skills crisis with an expected deficit of 1.5 million people within five years.
  • Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
    May 2017, Vision Catcher, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
  • IoT running wild compromises security
    May 2017, Genetec, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Constant connectivity and the rapid flow of information may offer new and convenient ways to do business and create value, but it also places the corporate network at significant risk.
  • Are you afraid of the dark (net)?
    May 2017, J2 Software, This Week's Editor's Pick, Cyber Security
    Given the recent global malware attacks, you should be, argues John McLoughlin, MD, J2 Software. Worst of all, you are probably not aware you have been hacked.
  • Accelerating the community theme
    May 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, News
    Milestone Community Days EMEA (MIPS) in Dubai highlighted the company’s platform strategy, connected products for the small and medium-sized businesses and higher performing software.
  • Securing your security
    April 2017, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure
    The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.