FEED Autumn 2021 Web

The Verizon 2020 Data Breach Investigations Report (verizon.com/business/en-gb/resources/ reports/dbir) points out that most successful attacks are short, “likely because it is both cheaper and easier for the attacker” – or because the breach is simply enabled by a single error. Unlike the TV5Monde or Channel 9 disasters, most successful attacks come and go before you realise it. Verizon’s report gives helpful pointers for recognising and assessing attacks. Social media is frequently – sometimes all-too-easily – hacked. Verizon notes, having crunched all the data, that breaches rarely end with a social action. A hack on social media can sometimes be the thin edge of the wedge. If you see a social media attack, expect other attacks to follow. Finally, cybersecurity isn’t about the technology at all. It’s about people and getting them the right training, support and resources to build a robust, attack-resistant (but never foolproof, alas) business. Human error – whether through a lazy shortcut, an honest mistake, or just being fooled by bad guys – is the source of the majority of breaches. The Verizon report tells us that the scramble to reconfigure businesses during the pandemic is a major vulnerability. “Carelessness, limited staffing and a rush to adopt new technologies and processes may result in an increase in error-based breaches.” No one is immune to cyberattack, but we can make ourselves more resistant. The first step is taking care of our health – building up resistance through knowledge, preparation, proper supplementary technologies, planning and a strong support team. The science of cyberdefence is well known and there are a lot of experts ready and willing to help.

CARELESSNESS, LIMITED STAFFING AND A RUSH TO ADOPT NEW TECHNOLOGIES AND PROCESSES MAY RESULT IN AN INCREASE IN ERROR-BASED BREACHES

incident. It was the biggest media attack the country had ever seen – and shut down everything, from email to editing systems. It was disseminated through malware, via devices at Channel 9’s Sydney headquarters. The fact that no ransom was actually demanded by the ransomware made investigators suspect a state actor. The sophistication of the attack led analysts to pin the blame on Russia early on. Further incidents involving Australia’s parliament, and family-owned business Taylors Wines, occurred at the same time. SMALL-TIME CROOKS These big state actor attacks are more like acts of war than crimes. They’re designed to affect all those who rely on those targets – sometimes in a physical way. Hospitals and health infrastructure are particularly vulnerable. But they’re mostly smash and grabs – a quest for fast money. That doesn’t mean hackers aren’t sophisticated. They’re increasingly well-networked experts with degrees, getting paid handsomely by employers, or working on commission.

@feedzinesocial

Powered by