Articles

August 1, 2017

Report: The top 5 cybersecurity threats of 2017

As large-scale cybersecurity attacks continue to proliferate in the enterprise, attackers are broadening their approach […]
July 30, 2017

4 Reasons to Use a Cloud-based Data Backup Solution

A solid data backup plan can help your company survive catastrophic data loss. Both cloud-based […]
July 29, 2017

Public vs. Private Cloud Backups: Which is Right for You?

Your most valuable corporate resource? Data. Effective storage and analysis of data leads to improved […]
July 24, 2017

Understanding Vital Differences between Cloud Backup and Cloud Storage

In the modern world of digital revolution, there is an ever increasing threat to safety […]
July 12, 2017
email marketing

Take your email to the Cloud!

Email is without a doubt the most important form of communication in the modern world. […]

Report: The top 5 cybersecurity threats of 2017

As large-scale cybersecurity attacks continue to proliferate in the enterprise, attackers are broadening their approach in order to strengthen their impact. A Tuesday report from Accenture Security outlined new methods that hackers are using to gain access, steal data, and make money.

According to a press release announcing the report, the results were collected from intelligence gathered from iDefense, a part of Accenture Security. In addition to the growth of the sheer number of attacks, they are also becoming more destructive and being utilized by other entities, such as nation-states, the release said.

“The first six months of 2017 have seen an evolution of ransomware producing more viral variants unleashed by potential state-sponsored actors and cybercriminals. Our findings confirm that a new bar has been set for cybersecurity teams across all industries to defend their assets in the coming months,” Josh Ray, managing director at Accenture Security, said in the release.

According to the report, here are the five most notable threats facing the enterprise in 2017:

  1. Reverse Deception Tactics – Tools like anti-analysis code, steganography, and command-and-control servers are being used to hide stolen data, the release said.
  2. Sophisticated Phishing Campaigns – Phishing emails, often used to deliver malware, are becoming more sophisticated with the addition of specific company information regarding billing, logistics, and more.
  3. Strategic Use of Information Operations – Cyberattacks and cyberespionage are growing tools used by nation-states and other actors to achieve political disruption.
  4. Alternative Crypto-Currencies – Bitcoin’s popularity is forcing cybercriminals to improve their laundering techniques, or adopt different cryptocurrencies altogether.
  5. DDoS-for-Hire Services – Easy-to-use and affordable tools have made it easier than ever for attackers to offer Distributed denial of service (DDoS)-for-hire services.

“While the occurrence of new cyber attack methods is not going away, there are immediate actions companies can take to better protect themselves against malicious ransomware and reduce the impact of security breaches,” Ray said in the release.

In order order to improve their stance against these threats, the Accenture report recommended that businesses take the following steps:

Source: http://www.techrepublic.com/article/report-the-top-5-cybersecurity-threats-of-2017/