Losses From Cyber Crime Exceed $1Trillion

All organisations are having problems with cyber crime and with the impact the Coronavirus hacking crime in particular is increasing. The FBI has seen a four times increase in cyber security questions and complaints since the pandemic began and the endpoint security experts at McAfee  say that the worldwide losses from cyber crime have exceeded $1 trillion in 2020 for the first time

Now a new report from Interpol says cyber criminals are targeting larger businesses. Interpol’s assessment of the impact of COVID-19 on cyber crime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure.

Furthermore, 2020 was also a year of significant change for working practices and lifestyles. In the UK, the population spent a significant portion of the year either under lockdown or being recommended to work from home where possible. In 2021, there are many cyber security threats that have either emerged as a result of the pandemic or have been exacerbated by it. Here are some of the cyber security threats facing businesses and organisations in 2021.

Increase in Home and Remote Working

The seismic shift in remote working and online shopping has opened up new concerns over cyber security threats, which means investors need to be aware of the growing opportunities now. Over 50% of the UK population now work from home which raises the cyber security problems considerably. 

Pandemic Phishing

Cyber criminals have of course used the fear surrounding the Covid-19 pandemic as a part of their tactics and virus related phishing became a major problem over 2020 and this looks like it will only get worse in 2021. Criminals use phishing emails to encourage people into clicking a malicious attachment often currently using the concept of Covid-19 and the worries around public health.  

Cloud Breaches

It is also true that the Covid-19 pandemic caused many businesses to alter the way they work and switch to cloud-based solutions. Just as with remote working, moving to the cloud can actually be a major positive, however, doing it too quickly and not taking the time to get the details right can leave your business vulnerable to cyber attacks.

Many organisations simply did not have the kind of IT expertise to manage this kind of migration effectively, and this leads to misconfigurations and other issues that can leave systems with security weaknesses.

Surveillance & Coronavirus

There have been  a lot of discussions on how surveillance technology has been used to contain or combat the virus. 
Initially most prevalent in China, where mass surveillance is already used, stories included facial recognition software and CCTV integrated with AI to track people’s movements from areas that there were known to be outbreaks from, therefore measuring the risk of the potential spread of contamination.

These reports have since seen other nations adopting similar measures, with the additional usage of thermal imaging technology which raises questions about privacy. If mass surveillance measures are introduced with the initial goal of public safety in mind, would it lead to more ‘intrusive’ measures? 

Attacks on the IoT

A growing number of businesses and organisations are implementing Internet of Things (IoT) applications and devices in order to enhance customer service, capture data and manage internal infrastructure. The problem here is that many IoT devices are not designed with security in mind, and may have flaws and vulnerabilities that are both easy to exploit and difficult to fix. If hackers are able to gain control of the IoT devices in an organisation they can potentially use them for access into the rest of the IT system.

Not all vulnerabilities that businesses need to be aware of relate to applications, in fact, in 2021, cyber criminals are increasingly finding weaknesses in the process flow of business operations. By observing the system, criminals find weak links in the processes. For example, a company might be using an automated invoicing tool, which could itself be vulnerable. 

Interpol:           IFSECGlobal:         IFSECGlobal:      City Wire Selector:       McAfee

Your organisation should be doing everything possible to mitigate these risks and find ways to prevent weaknesses and vulnerabilities in your IT systems and at Cyber Security Intelligence we recommend employee and management cyber training. For more information and advice please contact Cyber Security Intelligence.

You Might Also Read: 

Spending  On Cyber Security Will Reach $60bn This Year:

 

 

« Everything You Need To Know About Hashing Algorithms
Use The Military To Attack Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Accolade Technology

Accolade Technology

Accolade provides the most technologically advanced host cpu offload, 100% packet capture FPGA-based PCIe adapters and 1U platforms available in the network monitoring and cyber security markets.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.