{"id":4156,"date":"2018-01-07T05:00:41","date_gmt":"2018-01-07T11:00:41","guid":{"rendered":"http:\/\/blog.zoha-islands.com\/?p=4156"},"modified":"2018-01-07T05:00:41","modified_gmt":"2018-01-07T11:00:41","slug":"most-dangerous-security-threats-of-2018","status":"publish","type":"post","link":"https:\/\/zoha-islands.com\/blog\/most-dangerous-security-threats-of-2018\/","title":{"rendered":"Most Dangerous Security Threats of 2018?"},"content":{"rendered":"<table border=\"0\" width=\"100%\">\n<tbody>\n<tr>\n<td valign=\"top\"><strong>What will be the biggest security threats of 2018? Would it surprise you to learn that YOU might be on the list? Read on to learn about the threats to your privacy and security that are most likely to impact you in the coming year\u2026<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div id=\"adsense-new\"><\/div>\n<div id=\"a005158more\">\n<div id=\"more\">\n<div class=\"KonaBody\">\n<h2>Are You Part of the Problem or the Solution? <img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-medium wp-image-4168\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2018\/01\/part-of-the-problem-300x124.jpg\" alt=\"\" width=\"300\" height=\"124\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/part-of-the-problem-300x124.jpg 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/part-of-the-problem.jpg 640w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/h2>\n<p>Ransomware and \u201cpeople\u201d topped a survey of security pros\u2019 predictions of the biggest cyber-security threats the world will face in 2018. But among the 72 respondents to research firm IDG\u2019s question, there are more specific responses and a few threats that are less than obvious. The latter, I think, may be the more dangerous threats. Read on to learn more.<\/p>\n<p><span id=\"ezoic-pub-ad-placeholder-116\" class=\"ezoic-adpicker-ad\"><\/span>Ransomware is a proven money-maker for scammers. By encrypting the precious data of a corporation, organization or end user, ransomware inflicts immediate and severe pain. The promise of getting data back quickly by paying a ransom is keenly compelling. Additionally, ransomware and its attendant \u201cvictim relationship management\u201d apps are now bundled into easy-to-use \u201cSoftware-as-a-Service\u201d sites that any aspiring blackmailer with a couple of hundred dollars can rent. So there will be exponentially more ransomware attacks launched in 2018.<\/p>\n<p>The targets of ransomware are predicted to shift from low-value individuals and small businesses to major corporate and government systems. A crook can charge much more for the encryption key to bigger and more critical systems. Targeting key executives within a large organization with carefully crafted phishing emails is becoming a fine art among criminals.<img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-4165 alignright\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2018\/01\/security-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/security-300x169.jpg 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/security.jpg 694w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>That leads us into the \u201cpeople\u201d security risk, which IDG\u2019s respondents cited 12 times to ransomware 11. There are many ways that human error can allow bad actors into a system whose hardware and software are well protected. You, faithful reader, may already know all about them. But the growing threat to you and your precious data is the staff of the online entities with which you do business.<\/p>\n<div id=\"crt-3\" class=\"ezflad-47\"><\/div>\n<p>Front-line employees are under ever-increasing pressure to produce more, leaving them virtually no time to think about whether they should click on the attachment to an angry \u201ccustomer\u201d complaint, or the link to a web page purportedly showing the cause for the complaint. Many of these staffers are unhappy, underpaid, and ripe to either cause their employers trouble or be recruited by bad actors in exchange for money.<span id=\"ezoic-pub-ad-placeholder-117\" class=\"ezoic-adpicker-ad\"><\/span><\/p>\n<p>Management, up to the C-level, doesn\u2019t do enough to train staff in best security practices, enforce them, and demand that software systems prevent staffers from doing things that can let crooks in the door. Even IT staffers, who know better, fail to apply patches to software promptly.<\/p>\n<h2>An Ounce of Prevention&#8230;<img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-medium wp-image-4166\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2018\/01\/equifax-data-breach-300x137.jpg\" alt=\"\" width=\"300\" height=\"137\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/equifax-data-breach-300x137.jpg 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/equifax-data-breach-1024x468.jpg 1024w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/equifax-data-breach-768x351.jpg 768w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/equifax-data-breach.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/h2>\n<p>In the recent<a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2017\/09\/equifax-data-breach-what-do\" target=\"_blank\" rel=\"noopener\"> Equifax data breach scandal<\/a>, it was discovered that a directive to apply a simple patch that would have protected the credit histories of over 140 million Americans went ignored for at least two months. I surmise that the derelict IT employee was not irresponsibly negligent, but simply could not find time to apply the patch without \u201cdisrupting\u201d normal business operations, which would have gotten him in trouble.<\/p>\n<p>The insensitivity to security extends across supply chains. As firms become more closely integrated with their partners, a security vulnerability in one member of the group becomes a hazard to all members. Yet very little is being done by any given firm to vet the cyber-security of suppliers and large customers.<\/p>\n<p><span id=\"ezoic-pub-ad-placeholder-113\" class=\"ezoic-adpicker-ad\"><\/span>The oldest networked information systems, including critical utilities, financial services, and health care providers, are generally the most vulnerable to modern hacking threats. The industrial controls that govern the flows of water, electricity, and even street traffic were designed with only the crudest password protection, if any.<img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-4169 alignright\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2018\/01\/the-internet-of-things-300x150.jpg\" alt=\"\" width=\"300\" height=\"150\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/the-internet-of-things-300x150.jpg 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/the-internet-of-things-1024x512.jpg 1024w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/the-internet-of-things-768x384.jpg 768w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/the-internet-of-things-1536x768.jpg 1536w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/01\/the-internet-of-things-2048x1024.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The Internet of Things is the fastest-growing \u201cattack surface\u201d for hackers on Earth. The makers of light bulbs, refrigerators, and coffee pots know nothing about cyber-security and don\u2019t want to pay for pros who do. Even Amazon Key, the company\u2019s latest \u201csmart\u201d innovation, allows delivery people to open the door to your home. But it launched with an <a href=\"https:\/\/www.extremetech.com\/electronics\/259146-amazon-key-hack-let-delivery-drivers-sneak-house-undetected\" target=\"_blank\" rel=\"noopener\">easily-exploited flaw<\/a> that would let a nefarious delivery driver walk off with the entire contents of a customer\u2019s house.<\/p>\n<p>\u201cThe Internet of things-connected world that surrounds each and every one of us is getting more complex, sharing more of our data in evermore opaque ways and getting less easy for the average user to understand, let alone to have any hope of controlling a perfect security storm,\u201d wrote Nigel Harrison, CEO at Cyber Security Challenge UK, in his response to IDG\u2019s survey.<\/p>\n<p>Simply banning \u201csmart\u201d gadgets from your home is not a perfect defense, although it will reduce the attack surface your home network presents to bad actors. You have no choice about the software that the electric company uses in its smart meters, or the security practices of the public works department that controls water delivery and traffic signals, or the practices of 911 system administrators. You don\u2019t even know what your car\u2019s computer is doing under the hood, or how it can be hacked to kill you.<\/p>\n<p>What you can do, and I urge you to do, is apply unrelenting pressure upon your government representatives and business partners &#8211; banks, Amazon, et. al. &#8211; to publicly demonstrate how they are acting to protect their systems upon which your livelihood and life increasingly depend.<\/p>\n<h2>Back to the YOU Part of the Security Picture<\/h2>\n<p>It never hurts to repeat a few personal security mantras. Below are some tips to other that will help you tighten up your own defenses, and ensure that &#8220;YOU&#8221; are not on the list of the most dangerous security problems in 2018.<\/p>\n<ul>\n<li>Keep Your Software Updated<\/li>\n<li>Use Anti-Malware Protection<\/li>\n<li>Create Strong Passwords<\/li>\n<li>Use Two-Factor Authentication<\/li>\n<li>Guard Against Phishing Attacks<\/li>\n<li>Backup your data!<\/li>\n<li>Have a Safe 2018<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What will be the biggest security threats of 2018? Would it surprise you to learn that YOU might be on the list? Read on to learn about the threats to your privacy and security that are most likely to impact you in the coming year\u2026 Are You Part of the Problem or the Solution? Ransomware &hellip; <a href=\"https:\/\/zoha-islands.com\/blog\/most-dangerous-security-threats-of-2018\/\" class=\"more-link\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":4161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/4156"}],"collection":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/comments?post=4156"}],"version-history":[{"count":0,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/4156\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/media\/4161"}],"wp:attachment":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/media?parent=4156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/categories?post=4156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/tags?post=4156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}