BradEgeland.com
  • Welcome
  • Blog
  • Expertise
  • Resume
  • Software / Service Reviews
  • Contact
  • Videos
  • Books / White Papers
  • Mentoring Contact Form
  • Awards/Recognition
  • Templates & Downloads
  • Clients
  • Professional Services
  • Past Survey Results

14 Emerging And Ongoing Cyberthreats Every Organization Needs To Be Aware Of

8/19/2022

0 Comments

 
Ransomware. Malware. Phishing attacks. Tech headlines are full of stories of the multitude of cyberthreats businesses face. Even so, every year seems to see new and reemerging cybersecurity threats, and some may be flying under the radar.

Whether because they haven’t had as wide an impact (yet) or because businesses and professionals have simply succumbed to “cybersecurity fatigue” and let their vigilance lapse, new and ongoing cyberthreats are being carried out successfully in today’s digital marketplace—sometimes with devastating impact. Below, 14 members of Forbes Technology Council discuss cyberthreats that may not be getting enough attention and why every organization with a digital footprint should be concerned.

1. Multi-Front Data Vulnerability

It’s important to keep in mind that most large enterprise organizations have data stored in multiple locations, leaving it vulnerable to attack on a variety of fronts—from cybercriminal activity and human error to fires and floods. Deploying proactive measures such as indestructible snapshots offers a critical layer of protection no matter where data is housed—before it’s too late to act. - Renen Hallak, VAST Data​

2. Exploitation Of Publicly Available Information

Exploitation through publicly available information is a significant threat, yet nearly no one talks about it. Most of the attacks happen after a cybercriminal collects basic information such as an email address, phone number, Social Security number and so on. Tech leaders should be concerned and educate employees on how to manage their personal information on the Web. - Rabiul Islam, TechForing Ltd

3. Data Theft And Extortion

One type of attack that is not getting enough attention is extortion. While ransomware attackers’ tactics have been effective in recent years, an increasing number of organizations are backing up their data so they do not need to pay a ransom to restore it. Now, however, attackers’ methods have evolved. They first create a copy of an organization’s data and then threaten to release it publicly unless a ransom is paid. - Eric Cole, Secure Anchor Consulting

4. Customer Account Takeover/Business Email Compromise

Customer account takeover is an urgent cybersecurity threat. Hackers are no longer attacking high-value targets directly, but rather phishing their vendors and supply chain—entities that generally have poorer security controls—and then sending a legitimate email to the target from this compromised account. ATO is a form of business email compromise, which the FBI calls the “$26 billion scam.” - Edward Bishop, Tessian

5. APP Fraud

Harder to identify and prevent in real time, authorized push payment fraud is on the rise. Currently, regulations favor financial institutions, placing the liability on consumers. While many predict a change, placing banks on the hook for APP fraud will trigger significant additional losses. Tech leaders need to move fast to develop a plan to prevent hemorrhaging money, with early diligence being crucial. - Dave Excell, Featurespace

6. Expanding API Attack Surfaces

Application programming interfaces are core to interapplication communication, providing access to third-party verification and data sources. As the API attack surface continually expands with new applications, products and markets, securing APIs becomes increasingly critical to avoiding data breaches. As organizations continue to build out their digital operations, they need to make securing APIs a core operational tenet. - Shay Levi, Noname Security

7. Complex Tech Stacks

The reality of cybersecurity today is that business leaders have to contend with a high degree of complexity, from accelerated digital transformation and cloud adoption in support of an agile workforce to the dissolution of the traditional secure perimeter. It’s a situation compounded by the shortage of tech professionals with cyber skills, as well as the high volume of tools and providers needed when implementing cybersecurity strategies. - Arno Robbertse, ITC Secure

8. Shadow SaaS

The decentralization of tech purchases is a huge risk that most companies have not begun to understand. The huge software as a service marketplace allows any employee to purchase an application, often for free, and use it with company data, putting employees, customers and partners at risk. Though companies know about sanctioned applications, shadow SaaS is one of the biggest risks most companies are not securing adequately. - Lior Yaari, Grip Security

9. Poor Employee Cyber Hygiene Habits

Many major data breaches, including the Colonial Pipeline hack, have been the result of poor security hygiene in employees’ personal lives, such as reusing account passwords on work computers or accessing company applications from unknowingly compromised personal devices. More attention should be given to helping employees manage their personal security outside the office to address these vulnerabilities. - Hari Ravichandran, Aura™

10. Lax Security Protocols

The biggest security threats are inside your network. Whether it’s laxity, failure to monitor access and entitlements or not providing employees with optimized workflows, leading to insecure workarounds, it starts inside. Make following security protocols seamless by automating processes when possible, implementing a zero-trust framework and frequently communicating best practices. - John Milburn, Clear Skye

11. Man-In-The-Middle Attacks

Using Wi-Fi at any third-party location, such as a coffee shop or conference, can allow attackers to deploy a man-in-the-middle attack. Secretly, your communications can be intercepted and/or altered on their way to the recipient. With access to your data, the attacker can do any number of things. Tech leaders can protect their personnel with encryption security and VPN protocols. - Nicholas Domnisch, EES Health

12. Overly Permissive Cloud Entitlements

It’s important to understand that in the cloud, human and machine identities are the security perimeter. Many data stores are exposed to the internet and accessible by any identity with the right permissions. Visualizing and eliminating risky permissions in the cloud is a complex and dynamic process, but organizations must make it a priority. - Shai Morag, Ermetic

13. The Lack Of Spectrum Network Backups

On July 8, 2022, the Rogers Telecommunications internet and mobile phone network crashed across Canada, shutting most of the entire country out of digital access, including cellphone coverage, Web access, debit payments and even 911 calls. The main reason? There is no backup system in place to deal with a big problem. Regulators need to ensure that a backup exists or revoke spectrum licenses. - Blair Currie, Snibble Corp.

14. Unsafe IoT Devices
​

Cyberthreats to Internet of Things devices are getting attention from tech leaders and cybersecurity companies. However, if we want to be ready for the massive adoption of IoT, we should also be ready for subpar, unsafe devices to be produced on a massive scale. So we need to be very concerned about application programming interface vulnerability and the protocols for sharing data between devices and mobile apps. - Jacob Mathison, Mathison Projects Inc.
0 Comments



Leave a Reply.

    Author:

    Picture

    Brad Egeland


    Named the "#1 Provider of Project Management Content in the World," Brad Egeland has over 25 years of professional IT experience as a developer, manager, project manager, cybersecurity enthusiast, consultant and author.  He has written more than 8,000 expert online articles, eBooks, white papers and video articles for clients worldwide.  If you want Brad to write for your site, contact him. Want your content on this blog and promoted? Contact him. Looking for advice/menoring? Contact him.

    Picture
    Picture
    Picture
    Picture
    Picture
    Picture

    RSS Feed

    Archives

    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    October 2012
    September 2012
    August 2012
    July 2012
    June 2012
    May 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011
    October 2011
    September 2011
    August 2011
    July 2011
    June 2011
    May 2011
    March 2011
    January 2011
    December 2010
    November 2010
    October 2010
    September 2010
    August 2010
    June 2010
    May 2010
    April 2010
    March 2010
    November 2009

    RSS Feed

Powered by Create your own unique website with customizable templates.