In 2020, the world changed overnight in response to the COVID-19 pandemic. As more organizations embrace and accelerate digital strategies - and most of us relied on the internet to go about our day-to-day business - cybercriminals have been presented with a vast array of new opportunities. to exploit.
Here are five important cybersecurity trends organizations need to watch out for in 2021.
According to a recent TransUnion survey, 42% of South African households have been targeted by COVID-19-related scams, or a 14% increase since the lockdown began in April last year.
As the F5 Labs 2020 phishing and fraud report showed, attackers are more blatantly opportunistic than ever. At the height of the first waves of the pandemic, phishing incidents increased 220% from the annual average.
Everywhere you looked, scammers were clinging to themes accentuated by the pandemic including sending fraudulent emails or texts related to emotional issues such as health measures, contact tracing, work protocols. home and charitable donations.
Fraudsters are also becoming more and more delicate. Most phishing sites now exploit encryption, with 72% of them using valid HTTPS certificates to trick victims. Additionally, 100% of drop zones - the destinations for stolen data sent by malware - used TLS encryption (up from 89% in 2019).
3D printers have been more prevalent in South Africa since the start of the pandemic and have been used for everything from airplane parts to rescue masks. Cybercriminals have also taken note.
Do you think fingerprints and 3D printed faces that can pass biometric authenticators represent a distant sci-fi future? Think again! These types of scams are just around the corner. It also won't require a high-quality scan from a victim.
Biometric authentication comes down to a probability score, and a printable
master key '' may look more like a bunch of composable parts than a replica of a person's face or fingerprint.
Route a packet over the internet just to say, "No, this one is rotten, throw it away." is a waste of resources. Moving products like bot protection and data validation to the edge is the obvious solution and will save both processing time and bandwidth costs.
This has become more of a boost for organizations seeking long-term, cost-effective digital resilience by adopting multi-cloud infrastructure, applications and data resources to accommodate scale, continuity and flexible operations of a remote or hybrid workforce.
The office landscape has changed dramatically in 2020. Millions of employees moved to remote work within days, and systems evolved rapidly. Unsurprisingly, this introduced a host of new risks.
The problem isn't the remote working itself, it's more that the traffic and activity data has started to look different at the same time. Just like when someone interferes with your vision with a torch, it takes time to readjust.
Once businesses recognize what the new breaches look like, we'll see a wave of breach announcements within a short period of time. South Africa's Personal Information Protection Act (POPI), which comes into effect in July this year, is also likely to produce more reporting on data breaches, as organizations implement systems to ensure compliance. conformity.
The deployment of 5G in South Africa promises to provide better access to connectivity and enable new levels of technological innovation. It should be noted that the deployment of 5G infrastructure represents one of the most challenging next-generation network deployments ever made in terms of scale and scope.
Service providers will need to meet extreme end-to-end bandwidth requirements, as well as provide highly responsive, low-latency connections to a multitude of devices and device types. In addition, they need to protect themselves against new threats and vulnerabilities, while consumers expect exceptional performance, the latest features and comprehensive security.
Remember that millions of connected devices represent millions of potential backdoors for hackers. More than ever, security solutions will need to consider complex attack vectors at scale, at every layer, and multiple threats.
Source: IT NEWS AFRICA