Security breaches are every day in the cyber news, and without proper security controls in place, your company could be the next! Often, employees are the source of security breaches when they don’t follow protocol or educate themselves on best cybersecurity practices. Avoiding internal threats inside companies helps organizations prevent cyber threats from external factors. Cybercriminals try to find vulnerabilities to become threat actors and penetrate companies’ networks due to employees’ ignorance.
Table of Contents
Top cyber security threats between 2020 and 2021
On the authority of the FBI, phishing scams were the most common type of cyber-attacks in 2020. It increased from 114,702 incidents in 2019 to 241,342 in 2020, with adjusted losses of over $54 million. Phishing scams are when you receive a message that looks like it’s from a legitimate source to try to get your personal information. It can be sent as an email, a text message, or through social media. Avoid messages from someone you don’t know asking for your username and password or credit card information.
Do not reply or click on any links in the messages.
As claimed by the FBI, ransomware incidents continue to rise, with 2,474 incidents reported in 2020. According to the Coveware report, data exfiltration extortion frequently occurs between Q4 2020 and Q1 2021. The average ransom payment increased 43% from $154,108 in Q4 2020 to $220,298 in Q1 2021. The 70% of ransomware attacks that included a threat to release stolen data in Q4 increased 10% in Q1. The top vectors for attacks included remote desktop protocol compromise, phishing emails, software vulnerability, and vulnerabilities in VPN appliances.
However, a recent report by Coveware informs that median ransomware payment down 40% in Q2 2021. Ransomware is a type of cyber-attacks that locks users out of their system by encrypting files and records on the device. They are typically carried out through email attachments, fake software updates, or malware downloads. The attacker then demands payment to give back access to the hacked device. It can also be delivered via an infected USB drive.
Business Email Compromise (BEC)
According to the FBI, BEC schemes continued to be the costliest in 2020: 19,369 complaints with an adjusted loss of approximately $1.8 billion. BEC is a social engineering and fraud technique where hackers spoof or compromise the employees’ emails through keyloggers or phishing attacks to do fraudulent transfers. Usually, emails belong to someone who has access to the company’s wire transfer information. Many of these attacks are successful because they follow many of the same steps as real business emails.
As believed by the article made by SOC and SIRT team from F5, DDoS attacks increased by 55% between January 2020 and March 2021. Also, they are becoming up more complex, with 54% of incidents using multiple attack vectors. Over the past 15 months, the most significant attack measured 500 Gbps and used no fewer than five different attack vectors.
A DDoS can be directed at a specific website or service on the internet. It can also affect an entire network by targeting its infrastructure like DNS servers or routers that helps to connect to the internet.
Hackers can carry it out by using many compromised devices simultaneously to send traffic to the target website. The cybercriminal sends floods of requests from each device so that the server cannot respond to them. It can also use a botnet consisting of infected devices, all controlled from one central point. This attack causes connection failure and makes it difficult for users to access sites on the internet.
Here, you can learn how to stop and prevent DDoS attacks, and even you can have general knowledge about how to prevent cyber security threats in companies.