Tag Archives: IoT

Keeping the Fourth Industrial Revolution Safe from Hackers

by Bharat Mistry

Did you know that by 2018, around 1.3 million industrial robots will be set to work in factories around the world? It’s an industry estimated to be worth $32 billion by next year, helping to power a fourth industrial revolution built on smart factories and automated processes. Yet as these robots become increasingly important in a range of industries, they’ll inevitably begin to pique the interest of cybercriminals and nation state hackers. The question is, just how exposed are they to cybersecurity threats, and what can be done about it?

That’s what Trend Micro set out to answer for the first time in a ground-breaking new report: Demonstrating Industrial Robot Attacks in Today’s Smart Factories. Its findings confirm Trend Micro as a leader in industrial IoT security, a message we’ll be taking to the Infosecurity Europe show in June. Continue reading

The Year of Online Extortion: Over 81 Billion Threats Blocked in 2016

by Bharat Mistry

Trend Micro blocked an astonishing 81+ billion threats for customers in 2016, according to our newly released TrendLabs 2016 Security Roundup. If any stat speaks of the scale of the challenge facing organisations from online attackers – and the need for comprehensive multi-layered protection – it’s this one. Ransomware unsurprisingly led the way last year, with a 752% increase in new malware families discovered. But it’s Business Email Compromise (BEC) that potentially threatens to cause more problems going forward. Continue reading

New Security Standards Could Reduce the Number of Exposed Internet-Connected Devices

by Raimund Genes

When was the last time you checked how many of your organisations’ devices and systems were searchable from the public internet? Do you know for sure that they’re all properly patched and configured? New research from Trend Micro suggests the sheer volume of devices exposed to the internet is putting organisations at unnecessary risk of data theft, sabotage, fraud and disruption.

It’s time Europe’s policymakers woke up to the dangers and helped establish security standards for IoT and similar devices. Continue reading

It’s Time to Up Cyber Maturity Levels in 2017 – Starting with the Endpoint

by Bharat Mistry

As we close out another eventful year one thing is patently obvious: cyber threats have never represented a bigger risk to firms. Data and security breaches recently revealed at the likes of PayAsUGym, Ryanair, Lynda.com, KFC and more have all provide a timely festive reminder to CISOs of the value of multi-layered threat defence. More concerning still are new stats suggesting UK firms continue to operate with lower levels of security maturity than their US counterparts.

A good way to start the new year would surely be to consider how your organization can be smarter about security in 2017. And that means taking a look first at the endpoint.

Another year of breaches
Even before the catastrophic breaches at Yahoo, which may have affected over 1.5 billion accounts, were revealed, this was already shaping up to be another epic year for the black hats. Perhaps most worrying from the stream of breach incidents we’ve all read about in the news over the past 12 months is the fact that organisations are still making the same old mistakes.

Newly released data from UK-based insurer CFC Underwriting makes for particularly uncomfortable reading. It reveals that firm handled more than 400 claims on cyber breach policies this year – with the main categories being privacy breaches (31%), financial loss (22%) and ransomware (16%). Now, we don’t have mandatory breach reporting laws in the UK – not until the European GDPR comes into force in 2018, at least. So this is an interesting reminder that, while we might not always hear about them, security incidents are happening – and affecting UK firms every day.

More concerning still is that UK firms apparently represent 8% of the insurer’s policy count, but 17% of its claims count. Why does the UK have a disproportionately high volume of claims? CFC reckons because of the low cybersecurity maturity of these organisations.

Start with the endpoint
A comprehensive approach to cybersecurity of course requires multiple layers of protection including web and email gateways, networks and servers – not forgetting the vital “people” and “policy” elements. But many of the attacks which have led to damaging breaches over the past year started at the endpoint – the initial incursion point into the corporate network. We therefore need to start our efforts by better protecting this layer of infrastructure – but it’s not easy given the explosion in endpoints facilitated by cloud, mobile and IoT technologies.

Trend Micro’s answer is XGen: a cross-generational approach reliant on multiple layers of protection. None of these are a silver bullet on their own. But together they can form a formidable defence against the vast majority of known and unknown threats.

It should feature signature and non-signature based tools, including behavioural based filters, app control, exploit prevention and machine learning. The latter has been used for years by Trend Micro. But in this context we’ve made it even more effective at stopping threats by designing capabilities which extract and analyse a suspect file’s characteristics before and during its execution. This helps to reduce false positives and improve accuracy.

Endpoint compromise can play a vital role early on in the cyber kill chain. As we head into 2017, don’t underestimate the importance of gaining visibility and control at this layer. With huge regulatory pressure coming from Europe in 2018, no CISO can afford to ignore it.