Page 76 - Cyber Defense eMagazine for July 2020
P. 76

Cloud-Based Attacks

            According  to  Threatpost,  “as  more  corporate  infrastructure  moves  to  the  cloud,  so  will  the  focus  of
            criminals.” This means that while conducting an attack will be more of a challenge, attacks may become
            more sophisticated and more common.

            Businesses and organizations are also more confident when it comes to the cloud. But confidence doesn’t
            always  translate  to  tighter  security  measures.  According  to  Forbes,  “60%  of  organizations  don’t
            understand the shared responsibility model when it comes to who secures workloads in the cloud. This
            will  create  a  false  sense  of  security  in  cloud security  providers  by  their  customers,  as the  latter  are
            responsible for securing privileged access to their cloud administration accounts and workloads.”


            Artificial Intelligence and Voice Phishing

            As  technology  becomes  more  advanced,  so  do  the  types  of  cyberattacks.  For  example,  “deepfake
            technology” can be used to exploit people in scams. According to MSNBC, the term deepfake refers to
            instances where creators have produced digital content by manipulating images, voices, images — and
            even create fake videos that look real. In one instance, according to Forbes, a CEO gave up $243,000
            due to a deepfake scam.

            An article about 2020 cybersecurity predictions in SC Magazine asserts that “voice phishing will become
            the new phishing bait.” In other words, it’s now easier than ever for scammers to sound like someone
            else. High-level people such as executives and politicians are expected to face heightened risk with
            advanced  deepfake  technology.  Those  scammers  can  then  leave  voicemails  (or  speak  directly  with
            callers) asking for donations or for personal information.

            How to Protect Yourself: Solutions & Tips

            There are many ways to protect yourself — and your business or organization — from cyberattacks and
            cyberwarfare. The Department of Homeland Security (DHS) is a good place to start and provides the
            following tips:



               •  Maintain up-to-date software and operating systems
               •  Ensure that your passwords are strong
               •  Remain vigilant and watch out for suspicious activity
               •  Do not click on links or open emails if you’re unsure
               •  Do not provide personal information
               •  Use secure internet connections
               •  Back up your folders and files
               •  Protect your home and/or business network


            Protecting your email is especially important. Investing in a good email archiving solution can also help
            you mitigate a potential attack by offering backup and disaster recovery options.

            It’s  also  important  to  be  aware  of  the  types  of  email  messages  you’re  receiving.  Poor  spelling  and
            grammar, mismatched URLs, messages asking for personal information, and notes where you didn’t
            initiate the action are just some examples of signs of a possible phishing attack.




            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         76
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   71   72   73   74   75   76   77   78   79   80   81