![]() This leaves a window open for security threats. Maintenance of air conditioning to building automation, for example, requires experts from other companies to enter and access the premises. Remote maintenance access: Many organizations require third party help to support their IT services. Left untouched, these are “at best” difficult to manage and secure. This is a challenge, because these environments are heterogenous in nature - an IT landscape consisting of many different systems and various hardware and software vendors. Ransomware: A type of malware from cryptovirology that threatens a victim by blocking data access or publishing personal data unless a ransom is paid.Īttacks on supply chain: Securing the supply chain is a necessity for large organizations. The attackers blackmail employees with email and phone calls. Security expert David Fuhr lists five cyber security weaknesses and trends as follows:Īttacks on company processes: Gaps or loopholes in a company’s framework invite cyberattacks. The Cisco Talos Incident Response (CTIR) report said: “Commodity malware is widely available to buy or download for free, it is typically not customized and is used by a variety of threat actors at different stages of their operations or to deliver additional threats.” Cyber security weaknesses and trends These attacks are based on programs that are readily available on the internet and can be used by anyone. What is commodity malware?Ĭommodity malware is the most prevalent standardized type of malware. This is the first time in a year that ransomware has not been identified as the most common cyberthreat, now representing 15 percent of attacks, followed by phishing. The IT sector is eighth on the list of the most affected industries. The telecom industry was recorded to be the most affected, followed by healthcare, and the education sectors. ![]() By Jaydeep Saha, Contributing Writer, HCL Technologies Ltd.Īccording to a recent report from Cisco’s cyber threat analysis organization, Cisco Talos, in the last quarter 20 percent of all cyberattacks were attributed to commodity malware attacks.
0 Comments
Leave a Reply. |