Page 144 - Cyber Defense eMagazine April 2023
P. 144

device added to a network becomes a single point of risk to the network it serves. Hackers use these
            weaknesses to launch their malware through phishing and smishing attacks. Given that the majority of
            individuals operating devices on networks are ill-informed about the dangers of ransomware installed via
            phishing and smishing, companies are sitting ducks for this kind of attack.


            Until cybersecurity solutions are decentralised and distributed; unifying the governance of all devices so
            they operate in harmony, ransomware attacks will continue to rise.

            The need for decentralised security is becoming more urgent, it’s estimated that global  ransomware
            damage alone will cost $256B in 2031. With decentralised security, each device becomes a cyber-trusted
            validator node that monitors every other device in the network in real time, removing traditional points of
            failure. It monitors the system’s metadata, OS levels etc. of the devices programmes and Smart contracts
            (if web 3), and not the activity of the user.

            In a decentralised cybersecurity environment, when a hacker interferes with code, there would be an
            instant alert and the device could potentially be locked out of the network, preventing the full infrastructure
            from being compromised. This ensures both Web2 and Web3 operate safely, bringing decentralised trust
            and security enforcement to centralised spaces.

            Detection  of  risks  and  governance  lapses  in  complex  environments  or  networks,  should  happen  in
            seconds, not months, which is currently the case. According to IBM, the average breach lifecycle takes
            287 days, with organisations taking 212 days to initially detect a breach and 75 days to secure it.

            For now, we are going to see an increase in attacks as technology is trying to understand web3 and catch
            up with web 2. The best defence is education - it’s vital that all employees and individuals are trained on
            their role in combating cybercrime. Given that 95% of all hacks are caused by human error, this would
            be a very worthwhile investment.



            About Naoris Protocol

            Naoris Protocol is the Decentralised CyberSecurity Mesh for the hyper-connected world. Our disruptive
            design pattern makes networks safer as they grow, not weaker, by turning each connected device into a
            trusted validator node. A robust Blockchain protocol that every company can use to protect against the
            escalating levels of cyber threat.

            Devices are rewarded for trusted behaviour, fostering a secure environment. Participants earn $CYBER
            staking rewards for securing the network.

            The more users, businesses, and governance structures that use the Decentralised Cyberecure Mesh,
            creating networks of networks, the stronger and more secure it becomes.











                                                                                                             144
   139   140   141   142   143   144   145   146   147   148   149