The Metaverse: A Reality Check

From virtual meetings to immersive 3D customer experiences, or even property tours, the Metaverse will transform the way that companies operate. Gartner predicts that by 2026, a quarter of us will spend at least one hour a day in the Metaverse for work, shopping, education, social media and/or entertainment. 

Some brands are already there today, such as Nike and Coca-Cola, who are using it to drive brand awareness and the purchase of physical products. It’s easy to see why more and more companies will start to do business there.  

But are they thinking about the risks? We will certainly need a different approach to security in a virtual world compared to the physical, but what will that entail?  Let’s take a look at what the risks are and how to start getting prepared, because you do need to start now. 

The biggest hurdle to the Metaverse being a secure environment is in its foundations. The Metaverse is built on blockchain technology and we have already seen serious security gaps in crypto currency marketplaces and blockchain platforms.  Due to the sheer amount of malicious activity exploiting services based on the blockchain it won’t be long before initial attacks in the Metaverse begin.

This will likely be based on authorisation in which user accounts will be hijacked, with identity and authentication being the critical attack vectors. For example, some people might want to have multiple identities within the Metaverse, perhaps one for transacting work conversations and another for personal shopping and entertainment. 
This adds another layer of complexity as there’s then no single identity that can verify it's definitely you.

The answer could be in 'chained identity' - using blockchain to  confirm who we are transacting with -  although this is a major challenge, since blockchain technologies are decentralised and unregulated, which makes things like policing the theft of virtual assets or preventing money laundering very difficult.

Redefining Reality 

Another key security challenge is in the safe spaces needed to conduct business. Imagine you’re on a Zoom or Teams call. It’s a private meeting space - but what will that be like in the Metaverse? How do we know that a chair someone is sitting on isn’t actually an avatar and we have an impostor in our midst? You may think that would be impossible, but it's a virtual world. Of course, it can.

We need to be able to discern between what’s real and what’s fake and having a safe space to meet and transact will be crucial.

When the Internet first came out, threat actors exploited the average human’s unfamiliarity with the tech by creating malicious sites that impersonated banks to obtain financial details. Phishing scams like this still occur, albeit we now see more sophisticated forms of social engineering. 

The Metaverse is like a whole new Internet, and you can guarantee that people’s unfamiliarity with it, both businesses and consumers, will be exploited.

Interestingly, every transaction that happens on the blockchain is fully traceable, so this will become far more important, especially when it comes to having an audit trail of what has been discussed and any decisions made in a business context. But that leaves a question over how that information is taken from the virtual world to the physical.

Are contracts going to be legally binding in the Metaverse? Or will they need to be brought into the physical world to be signed and then pushed back in? How will that be done securely? 

Researchers have discovered security gaps within blockchain and crypto projects which are part of the Metaverse. 
The vulnerabilities that been exploited by cyber crime are focused on vulnerabilities with smart contracts that allows hackers to exploit and drain crypto platforms and around application vulnerabilities inside blockchain platforms that allows hackers to attack through the platforms and hijack users’ wallets balance. 

There is a danger that we rush headlong into the Metaverse without considering these types of implications. 
A lot of the concerns around security in the Metaverse are exacerbated by the huge skills shortage in the cybersecurity sector. According to the 2021 (ISC) Cybersecurity Workforce Study, there is a shortage of 3 million cyber security professionals and the current global cyber workforce needs to grow by 65% to effectively defend organisations’ critical assets. That percentage is likely to be a lot higher if we also consider the new virtual world.
Is it worth it? 

Other cyber security risks within the Metaverse abounds such as cyberattacks via the use of vulnerable AR/VR devices, as an entryway for evolving malwares and data breaches. These devices inherently collect large amounts of user data and information such as biometrics, making it attractive to hackers. Concerns around data privacy are also a growing voice amongst Metaverse sceptics, with additional data being collected through avenues like Second Life, potentially violating user privacy.

You might wonder why bother if there are so many risks involved? But it is absolutely worth putting the time in now, to get ready for moving across to the Metaverse. Any company that doesn’t, may find itself in a place where it’s playing catch up and potentially losing out on business or engaging in processes that put the business at risk. 

Organisations will need to be much more reliant on their partners around the world to help mitigate risk, as this is very much a global phenomenon. But there will always be some risk and for for those that get it right, there will be huge rewards.  

Top Metaverse Security Considerations 

1.    It's coming. You can't put your head in the sand and pretend that it isn't. Business leaders and security professionals need to talk about it and understand what it might mean for them. Understand the landscape by looking at what competitors are doing in that space.

2.    Have a look at how you are currently running services now in the physical world and understand if these services map in any way to the Metaverse. You may find that some of them don't and aren't even secure in this world, such as mobile devices, tablets, cloud and multi-cloud.

3.    Understand how to get your identification and authentication done correctly. The answer to that isn't just having a password or two factor authentication. Companies need to really start upping their game around these two issues. People tend to do things without thinking about security, whereas they should be thinking of security first.

Businesses won’t be able to do it themselves, it will take a great deal of partnering with organisations that work within that space. The Metaverse will hit everyone, and there’s no denying that mistakes will be made, similar to those that were made in the early days of the Internet.  

You Might Also Read: 

Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse:

 

« EU Businesses Risk Fines For Not Complying With IoT Security Rules
US Defence Needs New Software at the Centre of its Operations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) is a service of DeIC (Danish e-Infrastructure Cooperation).

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Lightpath

Lightpath

Lightpath is revolutionizing how organizations connect to their digital destinations by combining our next-generation network with our next-generation customer service.