Businesses Must Prioritise Safeguards Against Common Threats

The rise of cyberattacks using old tricks and proven methods is expected to continue. Criminal organisations are relentlessly seeking access to your systems, aiming to exploit vulnerabilities in your environment and disrupt your supply chain.

Businesses, regardless of size, must prioritise safeguards against common threats like business email compromise and compromised user accounts.

Detecting unusual behaviour is crucial for preventing invoice fraud and session hijacking, which could lead to reputational and financial damage. Moreover, ransomware attacks are proliferating, facilitated by professional groups offering easy-to-use ransomware kits to a growing number of affiliates. Businesses need to embed resilience into all aspects of their operations to mitigate the impact of such attacks.

Deepfake technology, which creates convincing fake videos, is rapidly advancing. It poses various risks, including tricking business users into fraudulent transactions, as seen in a case where a Hong Kong multinational was duped into paying $25 million to fraudsters using deepfake videos of executives.

Furthermore, deepfakes can be employed to spread misinformation and sow fear, particularly during times of uncertainty such as election years. To counter these threats, enhanced monitoring and targeted protection measures are essential to ensure both systems and personnel are resilient and informed.

Failure to implement a comprehensive cyber resilience program leaves businesses vulnerable to increased cybercrime and significant financial losses.

Despite the growing threat landscape, many executives continue to overlook cybersecurity risks and underinvest in resilience measures. This stems from a lack of awareness about the severity of potential risks and complacency due to past incidents going unnoticed.

Legislation addressing cyber risk is expected to expand globally, although its effectiveness remains subjective. Collaborative efforts between industries and policymakers are crucial to develop practical and relevant laws that keep pace with technological advancements. However, the slow pace of legislation could render it outdated by the time it's enacted.

Artificial intelligence (AI) has become a prominent tool in cybersecurity, offering both opportunities and challenges. Poorly implemented AI solutions can compromise data security, leading to unauthorised access and breaches.

Attackers are leveraging generative AI to enhance their tactics, while defenders are increasingly relying on AI to detect threats quickly amid the growing volume of network traffic. However, effective use of AI requires continuous management and monitoring to remain effective.

Partnering with established cybersecurity technology firms can bolster a company's capacity and provide enhanced visibility into potential threats. By leveraging proven solutions and expertise, businesses can better protect themselves against evolving cyber threats and mitigate the risks.

John McLoughlin is CEO of J2 Software

Image: CherriesJD

You Might Also Read: 

The Power Of Unified Cloud Protection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Warfare & The Future Of AI
23andMe Sparks A Rethink About Safeguarding Critical Data »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Maltiverse

Maltiverse

Maltiverse is a threat intelligence platform that provides security teams with high-fidelity threat data and malicious IOCs to enhance detection and response.