Security Focus Africa January 2020

Page 26

CYBERSECURITY

No immunity from cyberattacks A new Cyber Security Report from Check Point Research shows that 28 per cent of all organisations worldwide were impacted by malicious multipurpose botnets, while the rise of 20 per cent of incident response cases were targeted ransomware attacks.

C

heck Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd, a leading provider of cyber security solutions globally, has published its 2020 Cyber Security Report. The report highlights the main tactics cybercriminals are using to attack organisations worldwide across all industries, and gives cybersecurity professionals the information they need to protect their organisations from today’s fifth-generation cyber-attacks and threats. The 2020 Security Report reveals the key attack vectors and techniques observed by Check Point researchers during the past year. Highlights include: • Cryptominers still dominate malware landscape. Even though cryptomining declined during 2019, linked to cryptocurrencies’ fall in value and the closure of the Coinhive operation in March, 38 per cent of companies globally were impacted by crypto-miners in 2019, up from 37 per cent in 2018. This is because the use of crypto-miners remains a low-risk, high-reward activity for criminals. • Botnet armies surge in size. Globally, 28 per cent of organisations were hit by botnet activity, an increase of over 50 per cent compared with 2018. Emotet was the most common bot malware used, primarily because of its versatility in enabling malware and spam distribution services. Other botnet actions such as sextortion email activity and DDoS attacks also rose sharply in 2019. • Targeted ransomware hits hard. While the number of impacted organisations is

24

relatively low, the severity of the attack is much higher – as seen in 2019’s damaging attacks against U.S. city administrations. Criminals are choosing their ransomware targets carefully, with the aim of extorting the maximum revenue possible. • Mobile attacks decline. 27 per cent of organisations worldwide were impacted by cyberattacks that involved mobile devices in 2019, down from 33 per cent in 2018. While the mobile threat landscape is maturing, organisations are also increasingly aware of the threat, and are deploying more protection on mobiles • The year Magecart attacks became an epidemic. These attacks which inject malicious code into e-commerce websites to steal customers’ payment data hit hundreds of sites in 2019, from hotel chains to from commerce giants to SMBs, across all platforms. • Rise in cloud attacks. Currently more than 90 per cent of enterprises use cloud services and yet 67 per cent of security teams complain about the lack of visibility into their cloud infrastructure, security, and compliance. The magnitude of cloud attacks and breaches has continued to grow in 2019. Misconfiguration of cloud resources is still the number one cause for cloud attacks, but now we also witness an increasing number of attacks aimed directly at cloud service providers. “2019 presented a complex threat landscape where nation states, cybercrime organisations and private contractors accelerated the cyber arms race, elevating each other’s capabilities at an alarming

SECURITY FOCUS AFRICA JANUARY 2020

pace, and this will continue into 2020,” said Lotem Finkelsteen: major intelligence Officer, Check Point Software Technologies. “Even if an organisation is equipped with the most comprehensive, state-ofthe-art security products, the risk of being breached cannot be completely eliminated. Beyond detection and remediation, organisations need to adopt a proactive plan to stay ahead of cybercriminals and prevent attacks. “Detecting and automatically blocking the attack at an early stage can prevent damage. Check Point’s 2020 Security Report shares what organisations need to look out for, and how they can win the war against cyber-attacks through key best practices.” Check Point’s 2020 Security Report is based on data from Check Point’s ThreatCloud intelligence, the largest collaborative network for fighting cybercrime which delivers threat data and attack trends from a global network of threat sensors; from Check Point’s research investigations over the last 12 months; and on a brand new survey of IT professionals and C-level executives that assesses their preparedness for today’s threats. The report examines the latest emerging threats against various industry sectors, and gives a comprehensive overview of the trends observed in the malware landscape, in emerging data breach vectors, and in nation-state cyber-attacks. It also includes expert analysis from Check Point’s thought leaders, to help organisations understand and prepare themselves for today’s and tomorrow’s complex threat landscape.

securityfocusafrica.com


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

CALENDAR

2min
page 37

TRENDS

0
page 40

DIRECTORY

7min
pages 38-39

INDEX OF ADVERTISERS

3min
page 36

The Public Protector, assessment and impeachment

2min
page 35

Looking ahead to

3min
page 34

Effective and economical video analysis in public space

2min
page 33

The Big Bad Wolf

3min
pages 30-31

AI supercharges surveillance

2min
page 29

Securex West Africa to celebrate 10th anniversary in March

2min
page 32

New CCTV analytics will make looters think twice

3min
page 28

Can we communicate better in a digital era?

2min
page 27

No immunity from cyberattacks

3min
page 26

Vox introduces affordable remote surveillance with Guardian Eye WiFi Camera

3min
page 25

No smoke without fire: South Africa’s illicit cigarette trade

4min
pages 18-19

Of challenges and doing things differently in 2020

13min
pages 6-9

What’s behind violence in South Africa? A sociologist’s perspective

5min
pages 16-17

News snippets from around the world

22min
pages 10-15

Security trends and other issues to consider in 2020

6min
pages 20-21

Securing your identity

4min
page 24

Advances in key and equipment management

2min
page 23

Changing the security game

1min
page 22
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.