Cybersecurity Beyond COVID-19

The coronavirus has made us more susceptible to attacks. Will the next pandemic become digital? … Read more Cybersecurity Beyond COVID-19

The coronavirus has made us more susceptible to attacks. Will the next pandemic become digital?

Cybersecurity Beyond COVID-19

CYBERSECURITY FOR THE POST-COVID ECONOMY Coronavirus Exposed Why We’re At Risk NEW PRĄCTICES, new weaknesses Between February and March 2020, Large-scale growth of HACKING & PHISHING АCTIVITY increased by 37% WORK-FROM-HOME technologies CUSTOMER-FACING networks ONLINE CLOUD services Have all been exploited by cyberattackers INCREASED SUSCEPTIBILITY TO ATTACKS In March & April 2020, 192,000+ “This rapid change means hackers will find a way…The hackers can find a way to hack a personal computer of an employee and through them get into our Crown Jewels” – Gil Shwed, Founder & CEO of Check Point 30% increase compared to pre-coronavirus coronavirus-related cyberattacks were reported each week WHAT COVID TEACHES US roblem has been detected and window co your computer. DRIVER IRQL NOT_LESS OR EQUAL If this is the first time you’ve restart your computer. If this S these steps: Check to make sure any new Lesson 1 20 M Lesson 2 Lesson 3 A CYBERATTACK could spread faster than a biological virus THE ECONOМІC ІMPACT of a digital shutdown could be immense RECOVERING from digital destruction could be very challenging Cyberattacks can spread at 9X the rate of COVID-19, and lie dormant for months while it spreads A digital virus with the same virulence as COVID-19 could brick or wipe 20 million infected devices Tech companies would struggle to meet the surge in demand, grinding the economy to a halt CYBERPANDEMICS THAT SPREAD FASTER In the near future we could see AND FURTHER THAN A BIOLOGICAL VIRUS, with an equal or greater economic impact WILL THE NEXT PANDEMIC BE DIGITAL? Cyberpandemic: A self-propagating, digital attack that exploits tech loopholes before patches and antivirus software become available Most likely would attack devices via an operating system or application Designed to lie dormant for extended periods while the infection spreads unnoticed CONSEQUENCES OF CYBERATTACKS On devices POOR PERFORMANCE DORMANT SPREADER TOTAL DATA LOSS BRICKED OR INOPERABLE 30% 50% 15% 5% GLOBAL LOSS OF INTERNET On the world WOULD COST $50 BILLION PER DAY DATA CENTERS MANUFACTURING PLANTS RETAIL STORES $12 MILLION per day $6O MILLION $5 MILLION per day per day “Our country will, at some point, face a major cyber event that will have a serious effect on our lives, our economy and the everyday functioning of our society.” Janet Napolitano Former U.S. Secretary of Homeland Security CYBERSECURITY IMPROVEMENTS TO PROTECT YOUR TECH Cloud Email Security Internet Of Things (loT) Since February 2020, including traditional scams, business email compromise, and extortion schemes 67 of enterprises have 67%% experienced an loT security incident PHISHING INCREASED 600% For enterprises, loT devices remain the weakest link in security GONEGIRL Remains the #1 vector in cyberattacks – phishing is often the first step Attacks the human factor, tricking users into divulging login credentials Many come with out-of-the-box security flaws Attacks will continue to make use of loT Reliance on public clouds to facilitate work-from-home increases risk of outages as a point-of-entry OT / IT Alignment Cybersecurity For Work-From-Home In 2020, As we recover from the pandemic, businesses must re-evaluate their security policies and procedure to reflect the shift to remote work OF ORGANIZATIONS 55% PLAN TO INCREASE IT/OT ALIGNMENT UPDATE cyber incident breach response and disaster recovery plans Traditional IT has little to do with operational technology ADJUST INSURANCE COVERAGES to match new cyber risk profile MANAGE ACCESS in ways that balance security and usability As industrial use of loT increases, the distinction will continue to blur CREATE NEW POLICIES for mobile security and bring-your-own devices A unified approach for all connected devices is essential for security Businesses should consider INCREASING BANDWIDTH to move teleconferencing between sites “Companies are stretched thin and this is benefitting the hacker. It is not sufficient to protect only networks from attack. Each individual system must be protected. If networks are penetrated, then all connected systems will be infected” ESTABLISHING SECURE VPN ACCESS for employee workstations ADDING A CLOUD ACCESS SECURITY BROKER to monitor data security REQUIRING NETWORK-LEVEL AUTHENTICATION for remote desktop protocols MANAGING COMPANY-ISSUED DEVICES centrally and with remote monitoring Rather than assigning administrative privileges to end-users Itai Sela CEO of Naval Dome Cybersecurity is möre needed than ever before – Stay ahead with Data Connectörs Virtual Cybersecurity Summit Series Sources: worldometers.info ncbi.nlm.nih.gov/pmc/articles/PMC7173804 ntsc.org/assets/pdfs/cyber-security-report-2020.pdf i-scoop.eu/internet-of-things-guide/industrial-internet-things-it-ot bloomenergy.com/blog/a-day-without-power-outage-costs-businesses Presented by: blog.checkpoint.com/2020/05/12/coronavirus-cyber-attacks-update-beware-of-the-phish Data Connectors Cybersecurity Community | Since 1999 cdn.www.carbonblack.com/wp-content/uploads/VMWCB-Report-2020-Cybersecurity-Outlook.pdf jpost.com/jpost-tech/check-point-ceo-we-need-to-prepare-for-the-coming-cyber-pandemic-629933 thehill.com/policy/technology/318937-napolitano-warns-large-scale-cyber-attack-on-us-is-inevitable who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance mmc.com/insights/publications/2020/june/cybersecurity-after-covid-19–10-ways-to-protect-your-business-a.html DEVELOPED BY weforum.org/agenda/2020/06/covid-19-pandemic-teaches-us-about-cybersecurity-cyberattack-cyber-pandemic-risk-virus N NOWSOURCING securitymagazine.com/articles/92541-maritime-industry-sees-400-increase-in-attempted-cyberattacks-since-february-2020 spectrum.ieee.org/tech-talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated


Categories: Infographics


Leave a Reply

Your email address will not be published. Required fields are marked *