Wednesday January 22, 2020
Home Lead Story No Environmen...

No Environment Immune to Cyber Attacks: Check Point

The growing popularity of public Cloud environments has led to an increase in cyber attacks targeting enormous resources and sensitive data residing within these platforms

0
//
Cyber Attack, Web-Listing, Malware
The dark net is that part of the Internet which is inaccessible when using standard browsers like Google. Pixabay

Be it supply chain, email, mobile or the Cloud, no environment is immune to cyber attacks as threat actors continue to develop new tool sets and techniques, thus targeting corporate assets stored on Cloud infrastructure, individuals’ mobile devices, trusted third-party supplier applications and even popular mail platforms, a new report by cyber security firm Check Point Software said on Friday.

“Be it Cloud, mobile or email, no environment is immune to cyber attacks. In addition, threats such as targeted Ransomware attacks, DNS attacks and Cryptominers will continue to be relevant in 2019, and security experts need to stay attuned to the latest threats and attack methods to provide their organisations with the best level of protection,” Maya Horowitz, Director, Threat Intelligence and Research, Products, Check Point, said in a statement.

According to Check Point Software’s “Cyber Attack Trends: 2019 Mid-Year” report, with over 50 per cent increase in attacks when compared to 2018, banking malware has evolved to become a very common mobile threat.

Today, banking malware is capable of stealing payment data, credentials and funds from victims’ bank accounts, and new versions of these malware are ready for massive distribution by anyone that’s willing to pay.

Cyberattacks
An employee works near screens in the virus lab at the headquarters of Russian cybersecurity company Kaspersky Labs in Moscow, July 29, 2013. VOA

Email scammers have started to employ various evasion techniques designed to bypass security solutions and anti-spam filters such as encoded emails, images of the message embedded in the email body, as well as complex underlying code which mixes plain text letters with HTML characters.

The growing popularity of public Cloud environments has led to an increase in cyber attacks targeting enormous resources and sensitive data residing within these platforms.

Also Read: Amazon Optimistic on Stable e-commerce Policy from India

The lack of security practices such as misconfiguration and poor management of the Cloud resources remains the most prominent threat to the Cloud ecosystem in 2019, subjecting Cloud assets to a wide array of attacks.

Threat actors are extending their attack vectors such as focusing on the supply chain. In software supply chain attacks, the threat actor typically instils a malicious code into legitimate software by modifying and infecting one of the building blocks the software relies upon. (IANS)

Next Story

Skills Required To Become An Information Security Analyst

Good analytical skills allow information security analyst to respond to incidents quickly

0
Analyst
It is vital that information security analyst is skilled and comfortable with the fundamentals of networking. This skill is specifically employable to maximise damage, malware and other cybersecurity threats are highly dependent on computer networks. Pixabay

Today’s rapid growth of technology comes along with the booming threat of cybercrime, thereby driving demand for more cybersecurity professionals. Here is a list of skills that every security analyst should possess to give the global population a safer tomorrow!

  • Communication

    Documenting incidents and communicating is the most important soft skill that information security analysts should possess. Good communication skills are not only essential during security incidents being escalated and passed around but also while working as part of a larger team. In addition to this, effective communication is needed at times when any records of activity or actions are taken is needed to be properly documented, which may be used in a legal proceeding.

  • Technology networking

      It is vital that information security analysts are skilled and comfortable with the fundamentals of networking. This skill is specifically employable to maximise damage, malware and other cybersecurity threats are highly dependent on computer networks. Besides acquiring basic information from network device logs, analysts should also possess knowledge of the OSI network model and network protocols. As a technology analyst, you should know what each piece of information signifies and how it might impact your analysis.  

  • Cybersecurity

      Understanding security fundamentals is equally important as developing networking knowledge. A solid understanding of various cyber threats can enable you to learn what patterns and behaviours to look for in your analysis. In order to be able to quickly identify suspicious or dangerous activity, you must familiarise yourself with the various patterns and different malware variants that are common to most attacks. A security analyst well versed in security fundamentals would be able to easily identify and deduce infected computers to be removed from the network and cleaned.

Cyber Security, Online, Computer, Cyber, Network
Today’s rapid growth of technology comes along with the booming threat of cybercrime, thereby driving demand for more cybersecurity professionals such as an Analyst. Pixabay
  • Analytical

     Good analytical skills allow information security analyst to respond to incidents quickly. Employers find it valuable when analysts are able to smoothly ability to function within a formal incident detection and response process. This is considered as one of the best practices in defending an organisation’s digital assets from cyber threats and even to prosecute the attackers.

  • Creativity

     This is another crucial soft skills that are critical for information security analysts to be able to anticipate cyber-attacks and always think one step ahead of a cyber threat. Detail-oriented forward-thinking requires a creative approach that may allow analysts to detect threats to cybersecurity, which are typically are hard to detect. Furthermore, information security analysts are expected to be focused on the details of a security system, noting any minor changes and foreseeing any potential problems, no matter the size of it.

ALSO READ: Here’s Why Alphabet CEO Sundar Pichai Believes That Artificial Intelligence Needs To Be Regulated

These skills put emphasis on the importance of IT Security Management degree. So apply today to develop the skills required to become an analyst.