Tag Archive for: Driving

Rise in Ransomware: Exploring the Driving factors


Ransomware attacks continue to dominate headlines with groups like ‘Lapsus$’ and ‘Conti’ popping up frequently in a constant barrage of alarming stories. There is always a new attack or development in ransomware that keeps cybersecurity professionals on their toes. Ransomware attacks have taken over as the most effective means for cyber assailants to use and exploit access to highly sensitive information for illegal gains.

Reasons Behind the Rise in Ransomware Attacks:

Compromised Credentials 

The most common way to steal data is by compromising passwords. According to Verizon, 81% of all cybercrime has stolen or guessed credentials as a starting point, a huge vulnerability for all organizations.

With just a username and password, you will never truly know the real identity of who is using them. Hackers will target both weak and already compromised passwords when acquiring entry into a system, device or network.

How to Respond: One of the best ways to keep your information safe is by using multi-factor authentication methods and stronger antivirus protection while also making sure that you’re practising smarter password habits elsewhere.

Application Vulnerabilities 

Remember the REvil ransomware digital supply chain hack in July 2021? In this incident the ransomware gang exploited vulnerabilities in a public-facing internet application and used it to spread malware to thousands of supply chain partner organizations. Equally dangerous was the PrintNightmare vulnerability that affects the Microsoft Windows Print Spooler Service. This has the potential to allow an attacker to control a compromised computer.

Application zero-day vulnerabilities likes these present a top attack vector that is being exploited by ransomware groups.

How to Respond: Patch management should be a high priority for every online business.

Risk-based vulnerability management is the key to identifying vulnerabilities that are most likely to be exploited and taking immediate action. If you are experiencing issues with vulnerability management, switch to fully managed security service (MSP) providers like Indusface. The MSP continues to operate 24/7 and manages the digital…

Source…

Latin America Data Center Physical Security Market Report 2022: Increased Data Center Deployment Driving Growth


Press release content from Business Wire. The AP news staff was not involved in its creation.

DUBLIN–(BUSINESS WIRE)–Jul 12, 2022–

The “Latin America Data Center Physical Security Market – Industry Outlook and Forecast 2022-2027” report has been added to ResearchAndMarkets.com’s offering.

Physical security layers are installed in data centers to prevent unwanted entry and threats. The Latin America data center market is witnessing strong growth and is dominated by colocation providers, followed by internet and cloud service providers.

KEY HIGHLIGHTS OF THE LATIN AMERICA DATA CENTER PHYSICAL SECURITY MARKET

  • Increased deployment of the cloud-based and edge data center facilities will increase the demand for physical security solutions such as video surveillance and access control systems.
  • Many data centers use Building Management System (BMS) to manage the physical security of their data centers (as part of the overall management of the building), including CCTV cameras, access controls, and even rodent repellent systems.
  • In 2021, Brazil and Mexico significantly contributed to the Latin America data center physical security market. In terms of Product, Video Surveillance is the major contributor to the Latin America data center physical security market.
  • The rise in data center facilities deployed across the region, mainly in Brazil and Mexico, will increase the demand for physical security solutions such as video surveillance and access control systems.
  • There have been advancements in video surveillance systems connected to cloud systems, which provide services such as recording, image captures, analytics, and notification services. These cloud-based video cameras upload constantly and need a reliable connection since they do not come with local storage. Cloud-based video analytics has become the latest trend in data center physical security.
  • Cloud computing and edge processing will drive the adoption of advanced video content analytics in the coming years. IoT-based sensors are also increasingly being deployed along with camera-based surveillance solutions.
  • Augmented…

Source…

Global Enterprise Endpoint Security Market Report to 2027 – Rising Number of Enterprise Endpoints and Mobile Devices With Access to Sensitive Data is Driving Growth – ResearchAndMarkets.com


DUBLIN–()–The “Global Enterprise Endpoint Security Market – Forecasts from 2022 to 2027” report has been added to ResearchAndMarkets.com’s offering.

Endpoint security is the technique of preventing harmful actors and campaigns from exploiting endpoints or entry points of end-user devices such as PCs, laptops, and mobile devices. Endpoint security solutions on a system or cloud protect against cybersecurity threats. Endpoint security has progressed beyond antivirus software to supply comprehensive security against sophisticated malware and new zero-day dangers.

Nation-states, hacktivists, organized crime, and purposeful and unintentional insider threats all pose a hazard to businesses of all sizes. Endpoint security is frequently referred to as cybersecurity’s frontline, and it is one of the first places where businesses attempt to defend their networks. Due to several benefits, such as cost savings with cloud storage, compute scalability, and low maintenance requirements, enterprise use of SaaS-based or cloud-delivered endpoint security solutions continues to grow.

The growing number of enterprise endpoints and mobile devices with access to sensitive data has created a tremendous need for endpoint security solutions, which is expected to drive the market.

In today’s environment, mobile gadgets such as smartphones and tablets have become necessary for both individuals and businesses. The number of employees using their phones for work is fast expanding, and mobile devices and applications have presented a slew of new attack vectors and data security challenges.

These cyber dangers range from Trojans and viruses to botnets and toolkits, and they can have a significant impact on the broader network, putting sensitive and private data at risk. For example, according to the Mobile Security Report 2021 by Check Point, 97 percent of businesses globally were hit by mobile attacks that used several attack vectors. At least one employee in 46 percent of those businesses downloaded a malicious app to their phone.

According to the same report, nearly every firm had at least one smartphone malware assault in 2020. The mobile network was responsible for 93…

Source…

Driving the business value of cyber security in an era of accelerated change


Over the past couple of years, as organisations have had to rapidly deploy cloud and digital technologies in order to stay open, the need to protect their distributed workforces and infrastructure has become more important than ever.

The practically overnight mass exodus to remote working saw the attack surface widen dramatically, leading to a slew of new threats, attacks and breaches.

So, as governments and security practitioners battle to keep up with the pace of change, what is next for the cyber security industry in 2022?

To find out, ITWeb’s 17th annual Security Summit will be held from 31 May to 2 June at the Sandton Convention Centre in Johannesburg.

This year’s Security Summit, themed: “Driving the business value of cyber security in an era of accelerated change”, will once again bring together leading international and local industry experts, analysts and end-users to unpack the latest threats facing African CISOs, CIOs, security specialists and risk officers.

Topics will include cyber diplomacy, security as a business enabler, vulnerability management, cloud security, DevSecOps, OT/IOT security, SASE, securing the remote workforce, the role of the CISO, supply chain security, user awareness and training, data privacy, mobile security and much, much more. Plus, meet with leading security technology providers to learn about the latest solutions to mitigate the ever-changing security and risk landscape.

Security practitioners must be up to speed with the latest tools and technologies that are being used to protect, fight and mitigate today’s potentially catastrophic threats, as well as the methods that attackers are employing to carry them out. And they have to do this in a regulatory environment that is more stringent than ever before.

This is why Security Summit 2022 will provide delegates with the information and expert advice needed to get their information and cyber security strategy to the next level.

Whether on the technical or business side, those just embarking on their security journeys, or some who want advice on how to get a better return on security investment, attendees will learn about the most important skills, insights and best practices for combating…

Source…