It's difficult to predict what will materialize in the months ahead in terms of cyber-risks, which is why it's wise to review your organization's security posture now
"Last year was unprecedented for many reasons, not the least of which was responding to the COVID-19 global pandemic. Unsurprisingly, cybercriminals leveraged the pandemic's uncertainty and disruption for their benefit in the form of cyberattacks on remote workers, consumers, organizations, and companies. We can expect for these attacks to not only continue but to multiply as a result. It's time to ensure your organization is prepared for the trends we see on the cyber-risk landscape..."
A vast majority of companies in a global survey from Microsoft report being a victim of a firmware-focused cyberattack, but defense spending lags, but defense spending lags
"Attacks against firmware are snowballing, outstripping many organizations' cyber-defenses, according to a survey from Microsoft. The report showed that more than 80 percent of enterprises have experienced at least one firmware attack in the past two years - but only 29 percent of security budgets goes to firmware security.
Firmware, a class of software that provides the low-level control for a device's specific hardware, is last on the list for security-protection investment. The study - which polled 1,000 enterprise security decisionmakers in China, Germany, Japan, the U.K. and the U.S. - showed that most security investments are going to security updates, vulnerability scanning and advanced threat-protection solutions..."
With an expanding company perimeter, it's time to implement these endpoint security best practices, from asset discovery to device profiling
"The enterprise definition of endpoint has dramatically shifted over the years. Endpoints traditionally referred to desktop computers and laptops, which could be secured with antivirus software and firewalls. Today, the term covers a wide array of devices used for business, from PCs and laptops to corporate- and employee-owned smartphones to IoT sensors -- all of which require much more security than antivirus and firewalls provide.
With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To build this policy, companies should ask themselves how much security is needed for their specific endpoints, as well as whether endpoint security tools should keep devices heavily locked down or provide lighter protections to allow employees some personal freedom..."
While the arrival of spring promises better days ahead, enterprises are also facing a cyberthreat landscape filled with both familiar threats and emerging attack vectors
"As a result, it's worth taking stock of current security systems and services to see what's working, what isn't and where operations can be improved. But how do businesses begin?
Start with the 30-day spring cleaning challenge. Experience four weeks of practical programming, followed by a two-day wrap-up. It's designed to help companies evolve current cybersecurity policies into improved infosec operations that reduce operational risk..."
We're only three months into 2021, and Akamai has mitigated 3 out of the 6 largest DDoS attacks they have ever witnessed
"Two of these hit the same company on the same day, and the attackers' goal was extort money from the target.
'Growing' DDoS attacks
Hoping for a major Bitcoin payout, DDoS attackers continue to raise the bar when it comes to attack size, frequency, and target diversification.
'In 2021 alone, we've already seen more attacks over 50 Gbps (as of 03/24/2021) than we saw in all of 2019. Keep in mind attacks of this scale can take almost anyone offline,' Akamai researchers pointed out.
IT disaster recovery, cloud computing and information security news
"Security and risk management leaders must address eight top trends to enable rapid reinvention in their organization, as COVID-19 accelerates digital business transformation and challenges traditional cyber security practices, according to Gartner, Inc. In the opening keynote at the recent virtual Gartner Security & Risk Management Summit APAC, Peter Firstbrook, research vice president at Gartner, said these trends are a response to persistent global challenges that all organizations are experiencing..."
'The first challenge is a skills gap. 80 percent of organizations tell us they have a hard time finding and hiring security professionals and 71 percent say it's impacting their ability to deliver security projects within their organizations,' said Mr. Firstbrook.
New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years
"Despite the intimidating nature of the threat landscape, organizations can achieve considerable defense in depth by monitoring a relatively small number of data sources and keeping an eye out for a handful of malicious patterns in the data.
In fact, much of the information required to detect most commonly encountered threats and malicious techniques can be drawn right from Windows event logs and systems monitoring, according to a new report by security vendor Red Canary..."
Chris Hass, director of information security and research at Automox, discusses how to shore up cybersecurity defenses and what to prioritize
"Last year and early spring has been undoubtedly tough for cybersecurity. We've seen one of - if not the - worst cyberattacks on U.S. companies and government agencies in the last decade; and the ProxyLogon Microsoft Exchange vulnerabilities continue to be dangerous.
Knowing just how vulnerable many companies are to organized malicious actors, IT teams are re-evaluating their shortcomings and processes when it comes to building their organizations' security infrastructure. Looking into the rest of the year, companies will need to adopt new strategies, procedures and technologies to become more resilient to the onslaught of cyberattacks.
Here are the three strategies that IT teams should prioritize going forward: Zero-trust approaches; patching; and automation..."
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal
"Security teams have learned many lessons during the pandemic. Everything from zero trust to better authentication methods and behavioral analytics have become front-burner items.
And for good reason. The pandemic accelerated digital transformation, which expanded the threat landscape as entire office buildings of people moved home to work. Now, as offices reopen, security will remain just as challenging as workers split their time between the office and home and resume business travel..."
See all Archived IT - Security articles
See all articles from this issue