2021 What he taught us about cybersecurity

The cyber-attacks associated with developments related to pandemic worldwide continued to affect organisms in 2021. Cybercriminals have doubled their attacks, taking advantage of countries facing new COVID-19 mutations or changing their border management, with the main vehicle being sellers of fake vaccine certificates on the dark web.

Check Point Research recently reported that cyber-attacks on organizations worldwide increased by 40% in 2021, compared to the previous year, with 1 in 61 organizations being affected by ransomware each week over the same period.cybersecurity

As organizations strive to recover from the pandemic, it is important to pay attention to cyber security when planning for next year.

Ας ρίξουμε μια ματιά σε μερικά από τα βασικά περιστατικά και διδάγματα στον κυβερνοχώρο από το 2021 που θα βοηθήσουν τους οργανισμούς να ασφαλίσουν και να προστατεύσουν τις επιχειρήσεις, τα περιουσιακά στοιχεία και τους ανθρώπους τους από πιθανές απειλές:

Global Rise in COVID-19 Fake Vaccination Documents: Global demand for fake vaccination certificates has skyrocketed in recent weeks.

CPR revealed that the number of sellers increased 10 times from August to September this year. As more and more countries have implemented vaccination certificate demonstration policies coming out of lockdown, the demand for fake certificates is increasing. Cybercriminals are taking advantage of these pandemic-related developments for personal gain, as evidenced by reports of counterfeit vaccine certificates previously sold for $ 80-100 / 110 AUD on the dark web and now on the web.

Attacks on vital infrastructure: Around the world, cybercrime organizations have increased attacks on key services and government agencies, such as transportation, education, etc.

An example of the scale and danger of these incidents is the cyber attacks on Iran's railway system earlier this year, which resulted in of the routes and directed passengers to call the telephone number of Iran's Supreme Leader Khamenei's office.

The incident served as a major appeal to governments around the world to precautionarily increase the security of critical state infrastructure, as the process of recovering from a cyber-attack of this magnitude is complex and time consuming.

Depending on Australia, we saw the news being held hostage as a major publisher was hit hard by a cyber attack that caused its broadcasts to be suspended. In the public sector, the attackers carried out a cyber attack on the Ministry of Education at the beginning of the new school year, the first in lockdown mode, creating a severe problem for staff, parents and students.

We live in an age where vital infrastructure can easily be hit in any corner of the world. What is most worrying is that most of the time, these incidents can most likely be prevented.

We urge you to ensure that you have an effective cybersecurity incident recovery plan in place, ensure that your systems are up-to-date, and that you leverage software from trusted third-party security vendors to from threats.

Triple-extortion ransomware Attacks: In her 6 month report για το 2021, παρουσιάσαμε έναν νέο τύπο απειλής – τις επιθέσεις Triple Extortion, μια στην ήδη ανερχόμενη ransomware απειλή.

For example, the REvil ransomware, one of the most prominent families responsible for dozens of major breaches since 2019 and, most recently, the Kaseya and JBS cyberattacks on July 4 earlier this summer.

Supply chain attacks
Incidents of the software supply chain sparked the interest of researchers after the SolarWinds attack. The Check Point Research team identified security vulnerabilities in Atlassian, a software platform based in Australia with more than 180.000 customers worldwide.

With a single click, an attacker could have used the flaws to gain access to the Atlassian Jira error system and obtain sensitive information. As CPR responsibly disclosed the findings of the investigation to Atlassian, the latter developed a correction to avoid any possible exploitation of these vulnerabilities.

Remote workforce and teleworking technologies have exacerbated the trend of supply chain attacks, but it is imperative that we ensure that these technologies have the best defense against the export of malicious data.

Securing the hybrid workspace: Μία από τις βασικές προ που αντιμετωπίζουν οι οργανισμοί σε ένα υβριδικό εργασιακό περιβάλλον είναι η ένταση και το πλήθος των επιθέσεων στον κυβερνοχώρο.

Cybercriminals are fully aware of the timing that industries may need to detect and recover from a potential attack. It can realistically take days, weeks, or even months to fix vulnerabilities if organizations do not have the proper security policies and infrastructure in place.

The bottom line is that the hybrid workplace is now a very big part of our daily lives and IT professionals and employees need to step up to ensure that every end point is secure.

Η Κωνσταντίνα Κούκου Cyber Security at Check Point Software Technologies δήλωσε σχετικά

"In short, during 2021, we learned that hackers and cybercriminals are always seeking to exploit organizations, businesses and individuals, and that no business or individual is immune or excluded from an attack. To stay one step ahead of the consequences of a security incident, organizations must adopt a precautionary approach to risk management and the implementation of security solutions. "An unprotected application or a vulnerable endpoint could be the starting point for a large-scale cyber attack."

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new by email.

security, security, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).