FORECAST: COMPLIANCE REGULATION, RANSOMWARE, IOT, COMPREHENSIVE CYBERSECURITY SERVICE AND MORE
Our 2018 Cybersecurity Trends article was developed to promote awareness and offer information on emerging threats, cybersecurity risk management, preventive measures, countermeasures and security awareness training to empower you with cyber intelligence.
MORE COMPLIANCE REGULATIONS
The need for regulation in cybersecurity has and will continue to give rise to regulatory standards and actions taken in upholding said standards.
- EU General Data Protection Regulation (May 2018)
- The new GDPR standards for processing, storing, and securing the personal data of EU citizens will have far-reaching influence and the threat of potentially major fines; even if you don’t work extensively within the EU, expect this move to inspire regulation elsewhere. The first few to violate the GDPR may be made into examples to deter future noncompliance.
- The SEC’s Cybersecurity Division aims to provide guidance and resources for the public and private sectors, including alerts, bulletins, and analysis.
- In 2017 New York became the first state to set minimum cybersecurity standards (23 NYCRR Part 500), affecting banks, insurance companies, and financial services institutions. Companies will likely still be scrambling toward compliance, and similar measures in other states may soon follow
- Standardization does not always have to be legal, and can include publications such as those of the National Institute of Standards and Technology, which creates research-driven helpful cybersecurity guides
TAKEAWAY: REGULATION CREATES A PRESSING NEED FOR PARTNERS THAT UNDERSTAND AND MEET THE LATEST RULES. ALIGN CYBERSECURITY™ COMBINES EXPERTISE IN TECHNOLOGY, GOVERNANCE, EDUCATION AND TECHNICAL LAW AS AN ALL-INCLUSIVE, END-TO-END SERVICE.
THE EVOLUTION OF RANSOMWARE
Ransomware was a big subject in 2017 and will likely continue to cause problems in 2018, as new attacks surface and hackers pivot into new avenues of attack and exploitation.
- Fallout from attacks like WannaCry has been enormous. It’s likely that hackers with aspirations of similar impact already have attacks in the works
- Ransomware campaigns may react to increased security by pivoting toward targeting more vulnerable individuals and businesses
TAKEAWAY: MAJOR ATTACKS ARE THWARTED, BUT REMAIN A MYSTERY. RANSOMWARE ISN’T GOING AWAY ANY TIME SOON, AND NIMBLE, UP-TO-THE-MINUTE KNOWLEDGE OF THE LATEST BREACHES AND PATCHES IS ESSENTIAL.
VULNERABILITIES IN THE INTERNET OF THINGS
- New devices continue to be added, but the Internet of Things remains a vulnerability, with many devices lacking basic security
- With estimates on the number of devices anywhere between 24 and 50 billion devices by 2020, the IoT and the potential losses from vulnerabilities will continue to rise exponentially
TAKEAWAY: MARKET PRESSURES AND RAPID EXPANSION HAVE MADE THE BUZZY IOT A PRIME TARGET. SHORING UP EXISTING SECURITY AND ENCOURAGING SECURE BEHAVIOR THROUGH TRAINING AND AUTHENTICATION WILL BE KEY TO HEDGE FUNDS AND ALTERNATIVE INVESTMENT FIRMS STAYING AHEAD OF THE CURVE.
TWO-FACTOR AUTHENTICATION IN THE CROSSHAIRS
- The relationship between defenders and attackers continues to be an arms race of developing technology
- As demand increases for two-factor authentication in response to large data breaches, hackers will be looking to find workarounds or vulnerabilities that diminish or sidestep the security two-factor affords
TAKEAWAY: TWO-FACTOR IS A GREAT ADDITIONAL LAYER OF DATA SECURITY, BUT SHOULD NEVER BE CONSIDERED A FINISHED, IMPENETRABLE SECURITY SYSTEM. SECURITY AT ANY LEVEL IS ONLY AS GOOD AS ITS ONGOING MAINTENANCE AND UPDATING.
NEED FOR QUALIFIED, COMPREHENSIVE CYBERSECURITY SERVICE
- According to a recent report, security incidents and operational/compliance issues are commonplace due to human error and malicious activity
- There’s a huge need for cybersecurity personnel, increasing demand for external services/partners and virtual Chief Information Security Officers (vCISOs) to provide services without hiring additional fulltime personnel
- Cybersecurity impacts multiple departments in a firm, therefore, a business needs to employ a multidisciplinary approach to cyber risk management.
- A comprehensive cybersecurity solution reduces the headache of working with multiple vendors and mitigates the risk associated with so many moving parts. Working with a team of subject matter experts across a variety of disciplines including education, legal, technology and security will build the diverse foundation a firm needs to protect their most critical assets today and in the future.
TAKEAWAY: CYBERSECURITY IS A MAJOR ISSUE FOR MODERN BUSINESSES, AND INVESTMENT FIRMS, PRIVATE EQUITY AND FINANCIAL INSTITUTIONS ARE PRIME TARGETS. SAVVY FIRM OWNERS WILL PRIORITIZE FINDING THE BEST SERVICE PROVIDERS, AND INNOVATIVE PLAYERS IN THE CYBERSECURITY INDUSTRY SHOULD TAKE ADVANTAGE OF THE OPPORTUNITY.
- The surge in Bitcoin’s value has brought increased attention to cryptocurrency; this has also made cryptocurrency a target for hacking and ransomware
- High-threat groups have begun targeting the cryptocurrency market and its major players
TAKEAWAY: BUSINESSES THAT DEAL IN OR ARE RELATED TO CRYPTOCURRENCY SHOULD EXPECT THE INCREASED INTEREST TO BRING MORE SCRUTINY AND A GREATER THREAT TO SECURITY AS UNSAVORY ACTORS ATTEMPT TO TAKE ADVANTAGE OF VULNERABILITIES.
NATION-STATE HACKERS AND PROXY WARS
- With North Korea named as a likely culprit for the WannaCry attack, hacking has moved to the international stage as governments weigh in and use cyberattacks against each other
- Tech companies may find it essential to work in between the public and private sphere as cyberattacks target private citizens and companies for public gain
TAKEAWAY: CYBERATTACKS AS A MEANS OF NATION-STATE ACTION ENTANGLE CITIZENS AND COMPANIES REGARDLESS OF THEIR PERCEIVED INVOLVEMENT. CYBERSECURITY, AND BETTER COMMUNICATION ABOUT THE NATURE AND SPREAD OF BREACHES, WILL BE A MAJOR TOPIC IN 2018.
HANDLING DATA BREACHES
- Equifax has summarily demonstrated the wrong way to handle a data breach, delaying, misdirecting, and underscoring their own failures. Their public embarrassment will hopefully be a lesson for other companies to more gracefully handle the PR and response to a breach.
- The Equifax data breach highlights the evolving threat landscape and the universal state of unpreparedness in both the corporate and personal contexts.
- Now more than ever, all consumers must also evolve, and learn how to protect their personal financial information and consumer credit profiles.
TAKEAWAY: HOW YOUR COMPANY HANDLES A DATA BREACH MAKES ALL THE DIFFERENCE IN MITIGATING LOSS — THE OPTICS CAN BE JUST AS IMPORTANT AS THE ACTUAL SECURITY OF YOUR DATA. SAVVY COMPANIES WILL BENEFIT FROM A PROACTIVE AND RESPONSIBLE CONTINGENCY PLAN IN THE EVENT OF A BREACH.
ENDPOINT SECURITY — PATCHING AND APPLICATION TESTING
- WannaCry could’ve been avoided with active patch management, but doing so remains a challenge for many organizations
- If you can’t manage endpoint security and simply leave it to chance, your organization is likely to be vulnerable to this year’s attacks
TAKEAWAY: IN MOST CASES, RANSOMWARE TAKES ADVANTAGE OF COMMON VULNERABILITIES. ACTIVELY MANAGING ENDPOINT SECURITY IS A SIMPLE WAY TO MITIGATE MASSIVE AMOUNTS OF RISK TO YOUR DATA SECURITY.
THINK BEFORE YOU CLICK — PHISHING EMAILS TIPS
As a cybersecurity best practice, Align advises you to remain vigilant and skeptical of potential email scams. You need to watch out for the following things:
- Phishing emails that claim to be from your financial institution, social media accounts and the like, where you can check if your data was compromised
- Phishing emails that claim there is a problem with a credit card, your credit record, or other personal financial information
- Calls from scammers that claim they are from your bank or credit union
- Fraudulent charges on any credit card because your identity was stolen
- Emails that your account has been suspended. If you want to change the settings of subscription services, never click on a link in an unverified email claiming it’s from an organization you have an account with. Instead, type the website name in your browser, log in to your account the standard way and check for any messages there.
DO YOU WANT TO DESIGN A CYBERSECURITY PROGRAM THAT WILL SATISFY REGULATORS, EMPOWER EMPLOYEES AND ENCOURAGE INVESTORS? DOWNLOAD OUR WHITEPAPER BELOW.