Page 144 - Cyber Defense eMagazine April 2023
P. 144
device added to a network becomes a single point of risk to the network it serves. Hackers use these
weaknesses to launch their malware through phishing and smishing attacks. Given that the majority of
individuals operating devices on networks are ill-informed about the dangers of ransomware installed via
phishing and smishing, companies are sitting ducks for this kind of attack.
Until cybersecurity solutions are decentralised and distributed; unifying the governance of all devices so
they operate in harmony, ransomware attacks will continue to rise.
The need for decentralised security is becoming more urgent, it’s estimated that global ransomware
damage alone will cost $256B in 2031. With decentralised security, each device becomes a cyber-trusted
validator node that monitors every other device in the network in real time, removing traditional points of
failure. It monitors the system’s metadata, OS levels etc. of the devices programmes and Smart contracts
(if web 3), and not the activity of the user.
In a decentralised cybersecurity environment, when a hacker interferes with code, there would be an
instant alert and the device could potentially be locked out of the network, preventing the full infrastructure
from being compromised. This ensures both Web2 and Web3 operate safely, bringing decentralised trust
and security enforcement to centralised spaces.
Detection of risks and governance lapses in complex environments or networks, should happen in
seconds, not months, which is currently the case. According to IBM, the average breach lifecycle takes
287 days, with organisations taking 212 days to initially detect a breach and 75 days to secure it.
For now, we are going to see an increase in attacks as technology is trying to understand web3 and catch
up with web 2. The best defence is education - it’s vital that all employees and individuals are trained on
their role in combating cybercrime. Given that 95% of all hacks are caused by human error, this would
be a very worthwhile investment.
About Naoris Protocol
Naoris Protocol is the Decentralised CyberSecurity Mesh for the hyper-connected world. Our disruptive
design pattern makes networks safer as they grow, not weaker, by turning each connected device into a
trusted validator node. A robust Blockchain protocol that every company can use to protect against the
escalating levels of cyber threat.
Devices are rewarded for trusted behaviour, fostering a secure environment. Participants earn $CYBER
staking rewards for securing the network.
The more users, businesses, and governance structures that use the Decentralised Cyberecure Mesh,
creating networks of networks, the stronger and more secure it becomes.
144