The speed at which ransomware is proliferating is mind blowing. In 2015, SonicWall’s Global Response Intelligence Grid recorded around 3.8 million attacks. By last year, that had grown to 638 million. Yes, you read it right – 638 million! That’s a staggering 167 times the number of attacks in 2015. Wow! And it’s easy to see why. Ransomware is particularly profitable for hackers. It’s a nasty type of malware that holds your data hostage by encrypting it and then asking you to pay for a decryption key. Stand and deliver on steroids.
With January rapidly becoming a distant memory, and as all those New Year good intentions get left by the wayside, I am pleased to report the race to the cloud continues apace.
But as enterprises embrace the cloud to help their businesses become more agile and responsive, they invariably encounter more security threats and become more susceptible to breaches from multiple channels. Legacy security technologies simply lag behind, as they just weren’t designed to deal with these threats.
So in this complex world, what do we think are the big up and coming cloud security trends? Here we take a look at our top five…
When Cloud was the new kid on the block, the risk of adoption was simply too variable and therefore untenable but that didn’t really matter. It was gathering such momentum the security market simply couldn’t keep up. So in line with tradition, the easiest option was to get the big red stamp out and mark it ‘unsafe’ and hope it would go away.
Businesses are lapping up mobile and cloud applications faster than iPads get snapped up at an Apple flash sale. Buoyed by seeing the impact applications have had on the lives of consumers, businesses are keen to benefit from the collaboration, flexibility and productivity boost applications bring. But they come with a serious risk warning.
The Department for Education’s statutory guidelines (“Keeping Children Safe in Education”) are now in force. For the first time the guidelines include the subject of the legal obligations on the school arising under the Counter Terrorism and Security Act 2015. On this subject the statutory guidelines are explicit:
As any law-enforcement advisor will tell you, criminals succeed mainly because they understand the human psyche. Knowing how to manipulate somebody into leaving a backdoor open is still the ultimate weapon in any criminal’s arsenal.
The thing about well known phishing scams is they’ve essentially become industry-comedy punch lines which also puts them in danger of being diluted as a meaningful and growing threat.
If you even so much as mention to a colleague the Nigerian Prince offering you many many monies to leave the country, you will instantly engage in a series of one-upmanship debates on who’s received the most spurious spam.
Cyber Security is now well and truly on the map. Politicians wax lyrical about how they’re fighting it, entire supplements of every major Sunday newspaper are dedicated to it and in general, the world is that little bit more savvy, I’m delighted to say.
Given that passwords are on the front line of defence in the security of corporates and individuals, it’s mind boggling how elementary some people’s passwords are. Some recent research by LeakedSource, delved into the frequency of use of LinkedIn’s 10 most pathetic passwords. Topping the list is “123456” with an incredible 753,305 LinkedIn users, using this most perfunctory of passwords.
I have a proposition to make. My proposition is that it is not possible to train or educate pupils into not cyberbullying, not viewing pornography, not sexting and that the stance of many educators and education experts that pedagogy is the best, the ‘supreme’ route to satisfy e-Safety legal obligations is, quite simply, wrong.