To avoid cyberattacks to personal mail, when registering on suspicious sites, you need to use virtual mailboxes. Also, sometimes, to confirm an account, you may need to enter a mobile phone number, in no case you do not need to do this, in this case the service of virtual SIM cards through which you can receive SMS online and protect your number from intruders will help.
Glasswall Solutions, Britain's leading cybersecurity company, today presents five key forecasts for 2019.
The list covers events that, according to the Glasswall team of experts, will have the greatest impact on cybersecurity over the next 12 months.
“2018 was a year of major cyber attacks that took a variety of forms: from hacker attacks, ransomware and phishing, to new sophisticated crypto jacks,” said Greg Sim, CEO of Glasswall Solutions.
“The digital landscape is becoming more complex and requires a serious reevaluation of how enterprises protect themselves. As artificial intelligence and machine learning evolve, hackers and criminals are developing increasingly sophisticated and covert attacks that go unnoticed for longer periods of time.
“Our forecasts are based on a new reality - on what we already see first-hand with our customers and in the market.”
1. Email is still the number one enemy.
As we recently saw in attacks on large US technology firms and industries announced by the US Department of Justice, attackers will continue to use message attachments because they know that this remains their most successful method of delivering malware. Attachments, such as PDFs and Microsoft Office documents, will continue to spoof even experienced users due to the sophisticated customization and targeting options that cybercriminals now use.
Sophisticated and insidious social engineering using stolen personal and corporate data will complicate the task of determining whether an attachment contains malicious or harmless content.
2. Major global attacks will decrease as criminals become more targeted.
As a result of the trend towards evasive and targeted attacks, fewer global large-scale events using an indiscriminate approach will occur. Attackers using such inappropriate methods know that their malware can easily be stopped and quickly becomes invalid, and that various national security services can soon figure them out.
In 2018, Glasswall saw an increase in attacks targeting specific organizations, industries, and individual users. This is an organizational brand - and the related hacking, theft or breach of confidentiality - these will be the headlines of 2019.
3. Cybersecurity will advance the list of business relationship priorities.
Criminals and hacker groups will more often use supply chain partners and vulnerable or poorly protected third-party products and services as attack vectors. This will increase the importance of building a mutually protective business relationship and reputation based on the most effective cybersecurity available.
Attackers will use vulnerable business partners to achieve larger and more profitable goals, disguising their activities as normal business communications. Malicious Exel, a Word document or PDF hidden as an attachment among millions of emails, is the perfect weapon.
4. Enterprises will face the reality of antivirus technology.
More and more enterprises are finally recognizing that antivirus and other detection-based software does not always work and that the greatest and most dangerous modern threats still pass.
The challenge will be to distinguish what works from the many marketing statements that hide the fact that there are two types of solutions - based on signatures or based on behavior. Cynicism will intensify when enterprises realize that these solutions are related to finding problems after they arise.
5. Security automation will take over task management, but there is one thing.
The constant global shortage of information security specialists will accelerate the widespread adoption of automation in an effort to normalize lower-level processes.
However, customers will demand that these products do not fail in the performance of their primary mission to prevent cyber attacks. In turn, instead of the current dominance of proprietary protocols, customers will require seamless integration between platforms and between security point solutions. They will move away from point technologies that offer little or no integration, and switch to technologies that provide unhindered access to structured and unstructured data and threat analytics.