Keep your software, your computer and most importantly, your antivirus up to date. I had to repeat that at least a thousand times since I was a techno columnist. I presented several ways to protect myself from viruses. But we must remain vigilant: cyber threats not only do not stop but continue to evolve.
What could hit our computers, phones and connected objects in the coming months? To learn more, here are my notes during a presentation titled Cyber Forecast 2018 by Ajay K. Sood, General Manager of Symantec Canada as part of the GoSec Morning Edition monthly presentations.
“The average consumer is in deep trouble. ”
The personal data of users are interesting for hackers. “The average consumer is in trouble. After the attacks on the companies, then the data (the big recent data leaks of thousands of users) … the hackers aim more and more in the personal capital of the individuals. What we know about you allows you to precisely target. If a hacker knows the model of your car because you talk about it on social networks, we can send you a malicious link about your vehicle. And if your accounts are hacked, we can also send credible messages that seem to come from you!
Who takes care of the data?
For businesses, it is crucial to managing personal data responsibly. It will be necessary to follow the rules of the GDPR (General Data Protection Regulation) and the CDPA in Canada. Consumers need to be made aware: who do they entrust their data to?
Beware of emails
Email messages (which contain links trapped) and social media (your account is hacked, you are transformed into an attacker) will not stop and will continue to target individuals. If it works, it’s still profitable for hackers. Especially when the victims make a payment in Bitcoin, which can not be traced or refunded …
Clouds are not foolproof
Cloud data should be paired with a cloud security solution to intercept threats.
The Internet of Things, a danger in the office
The Internet of Things is becoming the new problem not only at home but also in business – like BYOD (Bring your own device) a few years ago. Apple Watch, bracelets and speakers connected … Each object represents a security risk.
In 2004, security researchers put a PC online without protection: it was attacked in 4 minutes. In 2016, researchers did the same thing with connected objects: they were attacked in 2 minutes. As soon as they are activated, the devices (baby cameras …) connect to the Internet to servers, which are not always well secured. Too many people imagine that data stays at home, “at home” … To learn more, we suggest listening to the Hackable podcast.
To minimize the risks, it is advisable to buy connected devices only from reputable companies.
Companies are hacked, their servers are coded, we ask ransom Bitcoin to decode. If it continues, it works. When there are no backups, or backups are encrypted … This is often the only solution. Ransoms now run around $ 1200 per workstation. Remember to make backup copies on an external drive …
One solution: to display only an image of the web pages
A new solution to protect yourself from cyber hacking: web isolation. We only display a picture of a web page, to avoid all scripts and malicious code. All that is displayed on the screen are images and text, filtered by an antivirus solution; a harmless virtual web page!
Create traps on his workstation
Another interesting trend is to create mini-traps – files that look great for pirates (honeypot) in their devices. We can detect and analyze the mode of operation of hackers.
Traveling to China?
Mr. Sood confirms that if you travel to China, you will try to attack your devices. An exhaustive intrusion test pen test (penetration test) … That in all likelihood you will fail …