Cyber threats are becoming more personal, finds new annual F-Secured consumer threat guide

A new look at the cyber security landscape from F-Secure, a global leader in simplifying cyber security, finds that wherever consumers go, cyber criminals will follow. That means users of massive online platforms such as Netflix, Facebook, and Steam should be prepared to face scams and infostealers, criminals’ current favourite threat.

F-Secured, the complete guide to online security in 2023, cuts through the complexity of the cyber crime landscape to offer a look at what were the biggest threats in 2022 and what risks consumers face now. It also includes simple steps users can take to make their favourite digital activities and connected homes safer, along with predictions about the threats our devices and families will face next.

“Cyber criminals benefit from the fact that we spend so much of our lives online. And they know they can reach us on the online services that we use,” said Laura Kankaala, F‑Secure Threat Intelligence Lead. “Because ultimately what they want is our attention. They want to trick us into acting against our own interests to click on malicious links or download malware. So, they spam our email inboxes, tag us in comments on social media, or send us direct messages in gaming or dating apps.”

F-Secure’s Threat Intelligence found that the most imitated social media platform used to spread phishing threats in 2022 was Facebook, the most popular social network on earth, at 62%. Steam, the largest distribution platform for PC games, was the most popular gaming platform to spoof at 37%.

Criminals have also increasingly used Netflix, the most popular video streaming service in most countries, as a phishing lure. Often criminals play upon consumers’ dependence on the service for entertainment. A common scam notifies a user that the service will be cut off because a recent payment was denied and leads to criminals taking over the account.

“Cyber attacks in general have become very personal,” Kankaala said. “And little is more personal than the credentials that secure our intimate digital moments.”

Infostealers rank as the most common Windows threat, making up 69% of the 30 most common attacks, according to F-Secure’s monitoring of prevalent threats. One of the most popular examples of this threat is the RedLine Stealer thanks to its irresistible business model. This customizable malware-as-service allows criminals to suck credentials stored in users’ browsers. Criminals buy this threat and then package the stolen data in the same place–dark web marketplaces.

The report also investigates how criminals profit off scams and malware in the wild. It includes a detailed look at phishing attacks related to Ukraine, the popular “Hi Mum” smishing scams, and attacks that specifically target gamers. In addition, Kankaala offers insights into the unsettling ways internet users can be targeted online by the people they know in real life.

“In the end, we all need cyber security in our lives,” she said. “Because it’s not just about avoiding the criminal hackers, it’s about taking control of our lives online — it’s about being digitally independent.”

Key topics in the F-Secured guide include:

  • Malware and infostealers
    A comprehensive look at the threats consumers are most likely to face.
  • Security and the smart home
    A review of challenges faced by consumers, hardware manufacturers and communication service providers due to the swelling numbers of connected devices in the home.
  • Phishing for new victims
    A look at the emerging phishing trends for 2023 with a focus on the growing risks in gaming and social media.
  • Cyber security is getting personal
    An examination cyber security issues that arise from adding a digital dimension to interpersonal relationships.
  • Trends and predictions
    F-Secure researchers, analysts, and threat hunters reveal what they’re seeing on leading edge of cyber security.

Read the whole F-Secured consumer threat guide here and keep up with cyber security news as it breaks each month through F-Alert, F-Secure’s monthly threat report, here.

Cybersecurity in the Age of Technology: Protecting Your Business Against Digital Threats

Technology has brought significant advancements in business operations and communication in today’s digital age. With the rise of the internet and the widespread use of electronic devices, businesses now have access to new ways of reaching their customers and conducting transactions. However, this increased connectivity also comes with significant risks, as cyber threats have become more sophisticated and prevalent than ever before. As a business owner or manager, it is essential to understand these threats and take steps to protect your company’s digital assets. This article will discuss some of the most common digital threats facing businesses today and provide tips on mitigating them.

The Importance of Cybersecurity

Cybersecurity refers to the practice of safeguarding electronic devices, networks, and sensitive information from unauthorized access, theft, or damage. Businesses must prioritize cybersecurity to prevent data breaches, financial loss, and damage to their reputation. A successful cyber attack can have devastating consequences, from legal liabilities to loss of customer trust.

In today’s digital age, businesses of all sizes are vulnerable to cyber-attacks. Cybercriminals use sophisticated techniques to exploit vulnerabilities in a company’s security systems, gaining access to sensitive data and causing extensive damage. Businesses need to implement robust cybersecurity measures to protect themselves against these threats.

Data breaches and cyber attacks can result in significant financial loss for businesses, including fines, legal fees, and damage to their reputation. These attacks can also result in losing customer trust, which can be challenging to regain. Businesses must invest in cybersecurity measures that can effectively detect and prevent cyber threats.

Common Cyber Threats

  • Phishing Attacks

Phishing attacks are a type of cyber attack that is prevalent today. They often use email or social media to trick people into revealing sensitive information, such as login credentials or credit card numbers. Phishing attacks usually come in the form of a fake email that appears to be from a legitimate source, such as a bank or a social media platform.

  • Ransomware

Ransomware is another type of cyber attack that has become increasingly common. It is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. Ransomware attacks can be devastating, leading to permanent data loss if the victim does not pay the ransom.

  • Malware

Malware is a broad software category designed to harm or exploit computer systems. Common types of malware include viruses, Trojans, and spyware. Malware can be used to steal sensitive information, damage computer systems, or control devices remotely. Cybercriminals use malware to gain access to sensitive information, steal financial information, and cause damage to computer systems.

Phishing attacks, ransomware, and malware are serious threats that individuals and businesses must be aware of. Taking proactive steps to protect sensitive information and prevent cyber attacks is essential to safeguard against the potentially devastating consequences of these attacks. Regularly updating software and antivirus programs, being cautious of suspicious emails or messages, and having a backup system in place are all effective ways to protect against cyber threats.

Cybersecurity Best Practices

  • Implement Strong Password Policies

Implementing strong password policies is one of the most effective ways to prevent cyber attacks. A good case in implementing a strong password policy can be low deposit casino UK who also needs to ensure they have strong security measures to protect your personal and financial information. Encourage employees to use complex passwords and to change them frequently. Consider using two-factor authentication to provide an extra layer of security. In addition to implementing strong password policies, businesses should consider using password managers. Password managers can generate complex passwords and securely store them, reducing the risk of employees using weak passwords or reusing passwords across multiple accounts.

  • Keep Software Up-to-Date

Software vulnerabilities are a common entry point for cyber attacks. Ensure that all software your business uses is kept up-to-date with the latest security patches and updates. Regular software updates and security patches can help prevent cyber attacks that exploit known vulnerabilities in outdated software. Implementing automatic updates or using a patch management system can ensure that all software is updated promptly.

  • Backup Your Data Regularly

Regularly backing up your data is essential to prevent permanent data loss during a cyber attack. Make sure that backups are stored in a secure location and that they are tested regularly to ensure that they can be restored if needed. Backups should be performed periodically and stored in a secure offsite location to protect against data loss due to cyber-attacks, natural disasters, or hardware failures. It is also essential to regularly test the backups to ensure they can be restored in a disaster.

  • Train Your Employees

Employees are often the weakest link in a company’s cybersecurity defences. Make sure that all employees receive regular training on how to identify and avoid common cyber threats. Encourage employees to report any suspicious activity immediately. Employee training should be ongoing to keep employees aware of the latest cyber threats and best practices for preventing them. This should include regular phishing awareness training, as phishing attacks are becoming increasingly sophisticated and challenging to detect.

Businesses should also have an incident response plan in place in case of a cyber attack. The plan should include procedures for identifying and containing the attack, notifying stakeholders, and recovering from the attack. Regular testing and updating of the project can ensure it is effective during an attack.

Conclusion

Cybersecurity is essential for businesses of all sizes in today’s digital age. By understanding the most common cyber threats and implementing best practices to prevent them, you can protect your company’s digital assets and reputation. Remember to keep your software up-to-date, back up your data regularly, and train your employees to identify and avoid cyber threats. By taking a proactive approach to cybersecurity, you can reduce the risk of a cyber attack and ensure the long-term success of your business.

New Study Reveals, Cyber Threats Within Digital Ecosystems May Be an Enterprise Blind Spot

Tata Consultancy Services (TCS) has today announced findings from its TCS Risk & Cybersecurity Study, which reveals that cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations.

When asked to rank where companies will see the greatest number of cyberattacks between now and 2025, ecosystem partners came in last place (10th). At a time when enterprises are increasingly banking on digital ecosystems for their growth strategies, TCS’ survey shows that only 16% of chief risk officers (CROs) and chief information security officers (CISOs) ranked digital ecosystems as a concern when assessing expected cyber targets, and only 14% listed the risks from such ecosystems as the top priority arising out of board-level discussions.

Companies across the globe are increasingly turning to digital ecosystems of partners, vendors, and even competitors to reimagine and grow their business. Ignoring the threats originating from these ecosystems represents a blind spot which needs to be addressed urgently,” said Santha Subramoni, Global Head, Cybersecurity, TCS. “One way of reducing the probability of an attack within digital supply chains is to implement a ‘zero trust’ policy—a framework based on the principle of ‘never trust, always verify,’ applied not only to humans but also machines.”

When mapping out priorities between now and 2025, CISOs rank governance, strategy, and talent acquisition highly. Ranking highest is the prioritization of the security posture of the company and defining the controls and standards. Ranked second is establishing a more robust cybersecurity strategy, followed by investing in security talent acquisition and development.

TCS’ study also finds that talent retention directly correlates with how a company stores its information. Cloud-positive organizations were found to have a slight advantage in retaining and recruiting talent with the notoriously hard-to-find cyber skills, compared to those companies who think that on-premises or traditional data center security is preferable to what is available via the cloud. In fact, embracing cloud platforms gives companies a five-point advantage in recruiting and retaining talent with cyber risk and security skills.

As businesses look to keep up with rapidly evolving complexities in cybersecurity, the talent gap is widening,” said Bob Scalise, Managing Partner, Risk and Cyber Strategy, TCS“Demonstrating a serious commitment to cybersecurity by sustained attention from senior leadership, funding, and process changes will be vital to recruiting and retaining top talent.” 

Among other findings, the study also highlights:

Some corporate boards may not be sufficiently focused on cyber risks.

One in six respondents reported that their corporate board of directors considers issues related to cyber risk and security only “occasionally, as necessary, or never.” Companies with higher-than-average revenue and profit growth are more likely to discuss cybersecurity at every board meeting.

Cloud platforms are considered more secure than on-premises and traditional data centers.

Sixty-two percent of companies are now as or more comfortable with the security provided by cloud platforms than that of on-premises and traditional data centers—suggesting that the common concern about the cloud in its early days is fading.

The TCS Risk & Cybersecurity Study, published by the TCS Thought Leadership Institutehighlights the most pressing cybersecurity issues facing senior business leaders across Europe and North America. The study is based on results of a survey of more than 600 CISOs and CROs, from companies with at least $1 billion in annual revenue, across banking & financial services, utilities, media & information services, and manufacturing. Topics include global risk, cybersecurity, resilience, and ecosystem/cloud security.  The survey took place in February and March 2022.

To view the full report and receive more information, visit on.tcs.com/risk-cybersecurity.