Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    5 Cybersecurity Threats That Aren’t Going Away

    A roundup of current cybersecurity threats, some better known than others – but all of which remain consistent problems.  

    By
    eWEEK EDITORS
    -
    May 3, 2022
    Share
    Facebook
    Twitter
    Linkedin
      data privacy

      Last year saw the highest average cost of a data breach in 17 years, with the cost rising from $3.86 million to $4.24 million on an annual basis, according to the IBM Cost of a Data Breach Report. Clearly, organizations must have the correct people and processes in place to prepare for unrelenting cyber attackers.

      As CIOs, CISOs, CTOs, and IT managers think about boosting cybersecurity strategies, they should consider what happened in the year prior and what might potentially get worse. Below are some of the cybersecurity threats that remain stubbornly consistent – and must be guarded against at all times.

      Also see: The Successful CISO: How to Build Stakeholder Trust

      1) Ransomware Attacks Shift to Smaller Targets

      Ransomware attacks are increasing and won’t let up anytime soon. These attacks are a simple and low-risk way for criminals to make quick money.

      Law enforcement is focused on egregious and high profile attacks. However, this will only shift the likely attacks toward mid-size and small companies. Responses from law enforcement may not be as strong and the criminal payout from attacking SMBs will still be lucrative.

      2) Endless Spear Phishing and Whale Phishing

      Phishing attacks continue to target people who have access to money – or the hackers think they do. For example, an employee in accounts payable gets their email compromised, and the criminal download their emails, which will have address books copied from vendors.

      Attackers will try to persuade vendors to route money to a new bank, and this will sometimes be successful. Attackers will also use the address book to try and spam new individuals and get their emails compromised by creating an almost endless circle of phishing. Since the threat actors now have a foundation created, they will increase attacks on the users that have been compromised.

      3) Crime Doesn’t Take a Day Off 

      Criminals do not work the typical 9-to-5, 40-hour work week and certainly don’t have vacation days – so they will attack whenever it’s advantageous. Holidays and weekends have historically been a perfect time to gain access to a company or an email system, and this will continue to increase.

      When Friday comes around, workers tend to be more checked out and this gives an attacker a massive advantage of two to three days in someone’s account. Organizations need to be more vigilant about compromises on non-operational days.

      Also see: Secure Access Service Edge: Big Benefits, Big Challenges

      4) Lest We Forget Network Appliances

      Stand-alone network devices, which include routers, firewalls, and switches, are not updated as often as servers within an organization. Attackers know this all too well and will create more targeted attacks against these network appliances.

      Businesses typically do not spend the needed downtime required to update these devices – which should change. Internal IT engineers prefer to not update firmware on these network devices due to the apparent threat.

      5) Exploiting New Remote Work Staff 

      Even as Covid mandates lift, employers have changed their traditional “work in office” model. Many employees continue to work remotely – and attackers will continue to try to exploit the situation.

      One method criminals are pushing is to get new hires to buy gift cards. Often, new hires will get an email pretending to be “the boss,” asking to buy gift cards or other things, such as a present for a client. Since it isn’t as easy as leaning over to the next employee workspace to ask if this is standard, and new hires are trying to make a good impression, workers may do just as their “bosses” have requested – without asking questions.

      The aforementioned cybersecurity trends have been building, yet fortunately there are a lot of proactive and protective solutions that a company can implement to combat these threats. For example, a next-gen anti-virus solution can definitely help out on the ransomware front and a reliable spam filtering solution will help with email.

      If organizations stay on top of these key vulnerabilities for cyberattacks, they have a better chance of coming out on top in the years ahead.

      Also see: Best Website Scanners 

      About the Author: 

      Chip Gibbons is the Chief Information and Security Officer for Thrive. 

      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×