Tag Archives: IoT

The Year of Online Extortion: Over 81 Billion Threats Blocked in 2016

by Bharat Mistry

Trend Micro blocked an astonishing 81+ billion threats for customers in 2016, according to our newly released TrendLabs 2016 Security Roundup. If any stat speaks of the scale of the challenge facing organisations from online attackers – and the need for comprehensive multi-layered protection – it’s this one. Ransomware unsurprisingly led the way last year, with a 752% increase in new malware families discovered. But it’s Business Email Compromise (BEC) that potentially threatens to cause more problems going forward. Continue reading

New Security Standards Could Reduce the Number of Exposed Internet-Connected Devices

by Raimund Genes

When was the last time you checked how many of your organisations’ devices and systems were searchable from the public internet? Do you know for sure that they’re all properly patched and configured? New research from Trend Micro suggests the sheer volume of devices exposed to the internet is putting organisations at unnecessary risk of data theft, sabotage, fraud and disruption.

It’s time Europe’s policymakers woke up to the dangers and helped establish security standards for IoT and similar devices. Continue reading

It’s Time to Up Cyber Maturity Levels in 2017 – Starting with the Endpoint

by Bharat Mistry

As we close out another eventful year one thing is patently obvious: cyber threats have never represented a bigger risk to firms. Data and security breaches recently revealed at the likes of PayAsUGym, Ryanair, Lynda.com, KFC and more have all provide a timely festive reminder to CISOs of the value of multi-layered threat defence. More concerning still are new stats suggesting UK firms continue to operate with lower levels of security maturity than their US counterparts.

A good way to start the new year would surely be to consider how your organization can be smarter about security in 2017. And that means taking a look first at the endpoint.

Another year of breaches
Even before the catastrophic breaches at Yahoo, which may have affected over 1.5 billion accounts, were revealed, this was already shaping up to be another epic year for the black hats. Perhaps most worrying from the stream of breach incidents we’ve all read about in the news over the past 12 months is the fact that organisations are still making the same old mistakes.

Newly released data from UK-based insurer CFC Underwriting makes for particularly uncomfortable reading. It reveals that firm handled more than 400 claims on cyber breach policies this year – with the main categories being privacy breaches (31%), financial loss (22%) and ransomware (16%). Now, we don’t have mandatory breach reporting laws in the UK – not until the European GDPR comes into force in 2018, at least. So this is an interesting reminder that, while we might not always hear about them, security incidents are happening – and affecting UK firms every day.

More concerning still is that UK firms apparently represent 8% of the insurer’s policy count, but 17% of its claims count. Why does the UK have a disproportionately high volume of claims? CFC reckons because of the low cybersecurity maturity of these organisations.

Start with the endpoint
A comprehensive approach to cybersecurity of course requires multiple layers of protection including web and email gateways, networks and servers – not forgetting the vital “people” and “policy” elements. But many of the attacks which have led to damaging breaches over the past year started at the endpoint – the initial incursion point into the corporate network. We therefore need to start our efforts by better protecting this layer of infrastructure – but it’s not easy given the explosion in endpoints facilitated by cloud, mobile and IoT technologies.

Trend Micro’s answer is XGen: a cross-generational approach reliant on multiple layers of protection. None of these are a silver bullet on their own. But together they can form a formidable defence against the vast majority of known and unknown threats.

It should feature signature and non-signature based tools, including behavioural based filters, app control, exploit prevention and machine learning. The latter has been used for years by Trend Micro. But in this context we’ve made it even more effective at stopping threats by designing capabilities which extract and analyse a suspect file’s characteristics before and during its execution. This helps to reduce false positives and improve accuracy.

Endpoint compromise can play a vital role early on in the cyber kill chain. As we head into 2017, don’t underestimate the importance of gaining visibility and control at this layer. With huge regulatory pressure coming from Europe in 2018, no CISO can afford to ignore it.

 

 

On World IoT Day, Time to Address Enterprise Smart Technology Risks

by Bharat Mistry

There’s a global awareness raising initiative for just about every aspect of IT and cyber security today. World Backup Day, Safer Internet Day, Data Protection Day – they all share a common purpose; to engage, educate and motivate individuals and organisations around the world. This Saturday 9 April will see one such event – the fifth annual World Internet of Things (IoT) Day.

The IoT is already having a huge impact on our lives – both at home and, more importantly, at work. But in this race for the new we run a very real risk of adopting technology which has been designed with little regard for security or privacy. So let’s use the occasion of World IoT Day to think more carefully about how to secure smart technology in the enterprise. Continue reading