fbpx
  • Kundcase
  • Blogg
  • Whitepapers
  • Press
  • Partners
  • Nyhetsbrev
  • Events
  • Kontakt
  • Customer Portal
  • Svenska Svenska Svenska sv
  • English English Engelska en
Basefarm Menu
  • Molntjänster
    • Publika molntjänster
      • Publika molntjänster
      • Amazon Web Services
      • Microsoft Azure
    • Privata moln
      • Privata moln
      • VMWare
      • IBM Power Cloud
    • Hybrida moln
      • Hybrida moln
    • Cloud management
  • Säkerhetstjänster
    • Skydda
      • DDOS Skydd
      • Web Application Firewall (WAF)
      • Web Application Vulnerability scan
      • Infrastruktur sårbarhetsanalys
    • Hitta
      • Säkerhetscenter
      • DDOS Skydd
      • Intrusion Detection System (IDS)
      • SIEM as a Service
    • Uppfylla
      • PCI DSS
      • Multi Factor Authentication (MFA)
      • Security Operation Center (SOC)
      • Säkerhetsstandarder
    • Åtgärda
      • Information Security
      • Dedikerade kundteam
      • Security Incident Response Team (SIRT)
  • Big Data och AI
    • Data Science
      • Idéinsamling och avgränsning
      • Prediktivt underhåll och avvikelsedetektering
      • Prediktiv analys
      • Rekommendationssystem
      • NLP och textutvinning
      • Datorvision
      • Djupinlärning
    • Data Engineering
      • Big data-applikationer
      • Molninbyggda program
      • Datakonsolidering
      • Machine Learning as a Service
      • IoT och Industrie 4.0 – End-2-End
  • Om oss
    • Orange köper Basefarm
    • ISO certificates
    • GDPR Compliance Statement
    • Hållbarhet
    • Värderingar
    • Mission & Vision
  • Sök
  • Menu Menu

Malware is so 2017: five new security trends to watch out for

Remember when several massive ransomware attacks went global and hit many big businesses? Outbreaks such as Petya and WannaCry really put the malware threat on the IT agenda and made cybersecurity a priority for everyone. But it doesn’t stop with malware, there are many more security threats out there. The attackers’ arsenal is expanding and becoming more complex. Fredrik Svantes, Senior Information Security Manager at Basefarm, discussed with us the latest developments that keep the cybersecurity community busy.

  1. Use of standard tools by attackers
    Many companies have become much more aware of the need to be more secure. Greater cybersecurity efforts have made it harder for attackers to remain undetected while they are within their target’s network. In its recent annual report, the Dutch national intelligence agency AIVD reports an increase in the use of standard tools for attacks, some from nations dabbling in digital espionage. Fredrik Svantes, sees this happening more and more: “Attackers don’t want to get caught while stealing valuable data. High-profile targets deploy many security systems, malware detection systems for example. If attackers use specific “hacker tools” in their reconnaissance phase, this will raise a red flag. So they opt for standard Windows tools, like Microsoft Power Shell, to look around in the network.”
  2. Big data becomes a security system
    How to keep out attackers who apply standard tools? Basically, this comes down to setting up a baseline for how employees use their systems. This is where big data analytics comes into the picture as it can help detect anomalies. “For instance, technicians will have certain work routines, while people in the finance department have a different workflow. When all of a sudden someone in the finance department opens Power Shell, this is not a standard behaviour. This will trigger warning signals even though it just happens to be a standard Windows application.” Especiallyusers with high security risks, like government and companies with significant volumes of IP or critical data to protect, rely on big data for security. Svantes: “Facebook does so for sure.”
  3. Security professionals are hard to find
    Organizations looking to hire security professionals find themselves competing in a fierce market. “If you need security personnel in about a year, you’d better start recruiting them now,” says Svantes. “You can’t start recruiting just three months before an important project.” Although the situation might be improving, with several top European universities introducing security education programmes, right now the lack of experts is a huge problem. For most companies, the best immediate bet is to look for external partners who can help to secure their IT. “Not every company needs a team of security professionals, but what everyone does need is people who are security aware. For example, developers should have security in the back of their minds while working on their projects.”
  4. Your servers turn into secret bitcoin miners
    Regardless of the market you operate in, a trend that is emerging is criminals utilizing compromised servers for cryptomining which requires high amounts of computing power. “To have a single server mining for cryptocurrency is not very efficient, but it adds up when you have thousands of compromised servers working for you. Because cryptomining networks use substantial resources, the increase of resource usage can often sets off alarm bells if proper detection measures are in place.” How can attackers be kept out? Most importantly, make sure your systems are up to date. Don’t leave things unpatched or run old versions of software. And of course: don’t click on everything you see. Attackers still see e-mail scams as an attractive “way in”.
  5. A shift from prevention to detection
    “It’s one thing to try to protect your company, but there is no way to be 100% protected,” Svantes states. “The past couple of years have witnessed a strong focus on preventing attacks from happening. But now, many companies are waking up to the fact that they can only prevent so much. What they can do however, is try to detect intrusions as soon as they happen.” In a world of changing threats and compute-everywhere environments, the old security paradigm of just building bigger walls will be replaced by a continuum from block to allow. Machine Learning is becoming the key technology for predicting, detecting and preventing known and unknown threats. According to Gartner, deploying threat detection and response tools is a top priority for Chief Information Security Officers (CISOs). These investments can make a big difference. A recent report published by the US Ponemon Institute calculates that when an intrusion is found in less than 100 days, the average cost is $2.8 million. When detection takes longer than 100 days, the expense jumps to $3.8 million.
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail

Related posts

New year, new vulnerabilities

mars 9, 2020/av johan_kan

Security Software & Tools Tips – December 2019

mars 9, 2020/av johan_kan
Read our Privacy and Cookie Policy l Read our GDPR compliance statement
© Copyright - Basefarm
© Copyright - Basefarm
BF-SIRT Newsletter 2018-12 What is Big Data? – A definition with five Vs
Scroll to top