Computer News Middle East May 2021

Page 46

INTERVIEW

ACRONIS

REMOTE SECURITY

CNME Editor Mark Forker spoke to Kevin Reed, CISO, at Acronis, to discuss how the security landscape has evolved since the onset of the COVID-19 pandemic, the concept that security is everybody’s responsibility – and the role Acronis is playing in terms of equipping its customers with the solutions to combat cyberattacks following the move to remote working.

R

46

to local privileged access, and then eventually attackers are attempting to compromise the whole network, or organisation in a bid to successfully execute their mission,” said Reed. During the first few months of the global COVID-19 pandemic every organisation was forced to implement a work from home model as part of their efforts to maintain business continuity, but as a result of this change enterprises were forced to open their networks. “What we observed during the first few months of the pandemic was a massive growth in hackers scanning the internet specifically for remote desktop protocols. Attackers were proactively

eed is regarded as one

acted as a trigger for an

scanning for misconfigured

of the most prominent

acceleration in the volume of

servers because they wanted to

thought leaders in

certain types of cyberattacks.

send spam. We also witnessed

the cybersecurity

We observed that with so many

the use of CellNet, a legacy

ecosystem - and has played a key

industries on a global scale

protocol used traditionally for

role positioning the Singaporean

transitioning to remote working

remote access, but it is now

security vendor as a global leader

there was a direct correlation

used primarily on IoT devices

in that space.

with specific types of hacking

was another target for hackers.

methods used by cybercriminals.

Hackers used the protocol to

threat landscape of the security

They are sophisticated

essentially search the internet

industry had changed since the

individuals, and they altered their

for typically misconfigured

global health crisis in 2020,

tactics to allow them to adapt and

home browsers and then

Reed highlighted the agility of

exploit the vulnerabilities that

attempted to authenticate itself

cybercriminals to changes in the

existed within many enterprises

and once successful would just

marketplace.

when moving their workforce to a

continue to scan. I do think that

remote environment,” said Reed.

it is important to stress that

When asked about the how the

“Over the last number of years, we have experienced exponential

Although the sophistication

companies were forced to provide

growth in cybercrime, but the

of attacks has increased over

remote access, without being

COVID-19 pandemic certainly

the years, Reed highlighted that

given the time to adequately

phishing remained the most

protect themselves against cyber

effective way for a cybercriminal

threats,” said Reed.

to infiltrate organisations. “We have seen that phishing

What we observed during the first few months of the pandemic was a massive growth in hackers scanning the internet specifically for remote desktop protocols.” MAY 2021

success and then they move on

There is a growing perception within the IT cybersecurity

continues to grow and is

ecosystem that security is

undoubtedly the preferred

everybody’s responsibility - and

method of technique for

that employees need to take more

cyberhackers. If you look at

responsibility when it comes to

the whole attack life cycle you

security, and that organisations

will see that there is initial

need to provide their employees

www.tahawultech.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.