Ransomware was on the rise throughout 2016.

January 10th, 2017 by Stephen Jones Leave a reply »

49% of businesses fell victim to cyber ransom attacks in 2016

Ransom is the top motivation behind cyberattacks, – Radware’s Global Application and Network Security Report 2016-2017
The report listed five cybersecurity predictions for 2017:
1. IoT will become an even larger risk. The Mirai IoT Botnet code is available to the public, making it more likely that cyber criminals of all experience levels are already strengthening their capabilities. In 2017, exponentially more devices are expected to become targeted and enslaved into IoT botnets. IoT device manufacturers will have to face the issue of securing their devices before they are brought to market, as botnet attacks from these devices can generate large-scale attacks that easily exceed 1 Tbps.
2. Ransomware attacks will continue to grow. These attacks will target phones, laptops, and company computers, and will likely take aim at healthcare devices such as defibrillators in the future, the press release stated.
3. Permanent Denial of Service (PDoS) attacks on data centers and IoT operations will rise. PDoS attacks, sometimes called “phlashing,” damage a system to the degree that it requires hardware replacement or reinstallation. These attacks are not new, but Radware predicts they are likely to become more pervasive in 2017 with the plethora of personal devices on the market.
4. Telephony DoS (TDoS) will become more sophisticated. These attacks, which cut off communications in a crisis, could impede first responders’ situational awareness, exacerbate suffering and pain, and potentially increase loss of life.
5. Public transportation system attacks will rise. As cars, trains, and planes become more automated, they also become more vulnerable to hackers, Radware stated.

To avoid ransomware attacks and other cyber threats: keep software up to date, back up all information every day to a secure, offsite location (e.g. Azure cloud back up), segment your network, performing penetration testing, train staff on cyber security practices.
Ensure passwords are strong and are regularly updated
Ensure you have deployed appropriate anti virus / anti-malware tools.
Test your back up and restore periodically.
Ensure your support contracts are up to date.
Don’t forget your hardware e.g. out of date protocols on routers may be targets for hackers.
If you have large complex networks and critical data and up-time requirements, then consider ethical-hacking penetration testing.
Managed services solutions can monitor your networks and services to ensure critical hardware and services are functioning.

Advertisement

Comments are closed.