Cyber Security Update February 2021

February 2021

Cyber Security Update

Cyber Security Update February 2021

  • 14 maj 2021
  • 4.1 Minuters läsning

SoftwareONE believes there is a need for additional information when it comes to cybersecurity, as organizations have made it clear that investment in a proper security strategy is paramount. SoftwareONE’s monthly Cyber Threat Bulletin provides updates on the most recent threats and latest breaches and how to react to them in order to stay on top of malware and ransomware threats.

Stay Ahead Of Cyber Threats – February Bulletin

Did you know that Microsoft was one of the most impersonated brands during phishing attacks in 2020? Microsoft 365’s user base grew to 258 million in 2020, higher than expected growth driven by the COVID-19 pandemic. And the tech giant has consistently remained at the top of Vade Secure’s Phishers’ Favorites quarterly reports, holding the #1 spot for four quarters. Moreover, Microsoft is not only the phishers’ favorite, but generally a popular attack target.

A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, administrator privileges on the servers, and access to connected devices on the same network. It was estimated that 250,000 servers fell victim to the attacks. On March 12, 2021, Microsoft announced the discovery of "a new family of ransomware" being deployed to servers, encrypting all files, making the server inoperable and demanding payment to reverse the damage. Keep up to date and read this article for more important cybersecurity findings you can´t afford to miss.

Changes in Cybersecurity Attack Motives and Methods

In the cybersecurity industry, we are seeing a change in the way that hacks are being performed. A recent set of attacks against critical infrastructure entities reveal new motives and methods. The attackers were not out to steal data but were looking to disrupt services and they used a new attack vector that has not been seen before. Instead of attacking their primary targets directly, they attacked less secure vendors that those targets use, as the following examples show:

New Successful Cyberattacks and Threats Methods

Recent trends have arisen as side effects of the global pandemic. Cybersecurity statistics reveal a huge increase in hacked and breached data from sources that were recently introduced in the workplace, like mobile and IoT devices. On top of this, COVID-19 has created ramped up remote workforces, making inroads for cyberattacks. Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data loss. Let´s have a look at the latest developments to keep you alert:

Data breaches can be far more than a temporary terror — they may change the course of your life. Whether you are offline or online, hackers can get to you through the internet, Bluetooth, text messages, or the online services that you use. Without proper attention to detail, a small vulnerability can cause a massive data breach.

How to Protect Your Business from Security Threats

So, what now? What can you do to protect your network, your company, even your reputation?

You need to prepare for the attack. Let’s face it, sooner or later the hackers will come to you. Don’t let yourself think that you don’t have anything that they want - you do. To protect your business from cyberattacks, you should arm yourself with an enterprise-grade security system and knowledge of the different types of cyberattacks facing businesses today. By understanding what you’re up against, you can effectively combat cyberattacks and minimize your business’s vulnerability to them.

Check out our Vulnerability Assessment & Penetration Testing Service to understand the risks of your network environment and reduce the possibility for intruders to gain unauthorized access to your systems and data. Further, we regularly monitor and report current threats and attacks to prepare your business for any cyber threat that might arise. We have collected the most recent data breaches, cyber threats and awareness news in our February Cyber Threat Bulletin.

Get your copy here and keep yourself up-to-date:

Kommentera denna artikel.

Vad tycker du? Dela gärna med dig av tankar kring ämnet eller den specifika artikeln.

Skriv här

Relaterade artiklar