The 5 Biggest Security Concerns After

WannaCry

The 5 Biggest Security Concerns after “WannaCry”

While we are still reeling from the aftermath of the WannaCry ransomware exploit and the global impact of the cyber threat and the extreme vulnerability of key industries, it might not be too early to start considering the next set of threats that we need to be concerned about.

Security vectors evolve rapidly because the "bad actors“ (those that want to exploit us) are constantly innovating. Many cyber-operations have organization charts similar to legitimate businesses and use best practices for management, marketing, pricing and operations etc.

Here are some of the threats that security experts are increasingly concerned about.

Data Obfuscation

The next iteration of ransomware that we fear is when the data of a company is not encrypted and held hostage, as in the case CryptoLocker or WannaCry. Rather, the key data of the company is changed and affects real-time information, e-commerce etc., creating chaos. Cyber criminals will now demand that you pay a ransom for your original data. The intelligence agencies of many countries, including the USA, believe that this is a real and present danger and it is only a matter of time until this kind of cyber-attack is launched.

Leaking Intellectual Property

As we have already witnessed with the threat of the release of the latest Disney movie or a NetFlix series like "Orange is the new Black“, the next iteration of ransomware is likely to be the release of Intellectual Property (IP). Millions of companies across the globe do not have their systems secured adequately and commonly do not patch known vulnerabilities. This is the equivalent of leaving keys lying around openly and allowing anyone to enter and exploit IP storage.

Internet of Things

Intel estimates that by 2020, connected devices in the Internet of Things (IoT) will increase from their current levels of 15 billion to 200 billion. These include everything from pacemakers to electric meters; refrigerators to light bulbs; and connected cars to clothes and shoes etc. The platforms that these are built on, have low/no security, and little oversight. Most operate off a self-regulation model and as a result are very vulnerable to hacking. Watch out for IoT comprises that have the capacity to make or break prominent companies.

Artificial Intelligence / Machine Learning Applied to Benefit Cyber-Criminal Ecosystems

Artificial Intelligence (AI) and machine learning are increasingly being used to combat cyber-threats. Access to such tools and platforms is still expensive and not ubiquitous. But this will change. Such tools will become more affordable in the future, benefiting criminal activities. When that happens, attacks will be automated and have the ability to morph and change on their own, continuing to spread and create widespread destruction in short periods of time. In comparison, the spread of WannaCry will look like the work of kindergarten kids. These exploits will be more threatening, faster and much more dangerous.

Quantum Computing

This may be the single biggest threat to cybersecurity that no one is paying attention to. What is quantum computing? This is the bizarre world of quantum mechanics where atoms can have multiple simultaneous states. This is different from the way our digital computers work today, which is represented by bits as 0s and 1s. Because quantum computers can occupy multiple coordinates thanks to the quantum phenomenon of superposition, tunneling and entanglement – they can compute vast quantities of information and massively accelerate computation. Using quantum computers, criminals could crack virtually any encryption mechanisms that is currently used by us for most of our most sensitive online tasks including financial transactions, healthcare information, personally identifiable information etc.

Need Support on Securing Your IT?

There is good way to close security gaps caused by mismanaged or unknown software installations with Managed Security Services by SoftwareONE.

Discover Managed Security
  • Managed Security
  • Cyber-Security, Cyber-Attacks

Reageer op dit artikel

Laat een reactie achter om ons te laten weten wat je van dit onderwerp vindt!

Laat een bericht achter

Auteur

Blog Editorial Team

Trend Scouts

IT Trends and industry-relevant novelties

Related Articles

Endpoint Detection and Response (EDR)
  • 12 juni 2020
  • William Jansen
  • Cybersecurity, Managed Security
  • Security, Cyber-Threats, Cyber-Attacks, Cyber-Security

Kennis is macht, inzicht met Endpoint Detection and Response geeft kracht.

Vaak is een endpoint device de belangrijkste ingang die gebruikt wordt door cyberaanvallers. Endpoint Detection and Response is een toolset voor opsporen, voorkomen en detecteren van bedreigingen. Lees meer hierover in de blog van William Jansen.

Data-verwerking
  • 20 mei 2020
  • Jurgen Hannink
  • Managed Security
  • Office 365, Security, Hacking, Cyber-Crime, Randsomeware, Authenticatie

Veilig werken in de cloud

Steeds meer bedrijven stappen over naar de cloud. Toch zien we vaak een discussie ontstaan rondom security, back-up en data-verwerking in Office 365.

windows-7-extended-support

Windows 7 Extended Support: Now Is the Time to Take Action!

Microsoft ended support for Windows 7. Find out which far-reaching impact this will have on your environment.