A long time ago in a galaxy far, far away, hacking was born. Over the years, hacking has evolved into a complex system characterized by advanced technologies, attackers and vulnerable networks. Cybercriminals are like the Sith, lurking in the shadows and plotting their evil attacks. On the other side, our cybersecurity and IT professionals are the Jedi, peacekeepers of the cyber world. With new hacking strategies and challenges emerging daily, we must learn how to defend ourselves against the dark side.
There are many factors standing in the way of winning this battle. From the lack of skilled professionals to sophisticated attacks and poor cyber practices, cybercriminals have access to various entry points. While it may sound like the light side is at a disadvantage, the force is with us. Advances in technology as well as new services and solutions are entering the market at a faster rate than ever before. As we continue to improve our defenses, it is important that we keep an eye out for new hacking strategies that enter the cyberverse.
Today, low-skilled attackers know how to conduct hacking techniques that were once designed for specialists. Spear phishing, according to McAfee Labs Threat Report, has become widely used to access a network as human error is the easiest entry point. And with the rise of social media, hackers are now able to pull more information about individuals and use it against them. This technique has been coined ‘rose phishing.’
McAfee also states that ransomware attacks have grown 118 percent in the first quarter of 2019. While hackers still heavily rely on human interaction and social engineering as attack vectors, new vulnerabilities within connected devices, including smart locks and coffee machines, have been detected.
So what’s the best way to prevent phishing scams, ransomware and other infections from invading your system? The same methods used to prevent the corruption of the galactic democracy: weapons. While light sabers won’t help here, security tools and software will:
- Only download software, applications and updates from official sources. Suspicious websites and “free” offers should raise red flags. If it seems too good to be true, it probably is.
- When surfing the web, keep ad blockers and virus detection software turned on. Safety warnings will pop up and alert you to any potential problems and where your system may be vulnerable. .
- Practice good cybersecurity hygiene. Beware of opening emails from unknown senders or senders outside of your organization, and never share, write down or duplicate your passwords. Create strong passwords that include letters, numbers and special characters.
- Install a reliable anti-malware program and constantly update and conduct scans to ensure your system is functioning properly.
In the first quarter of 2019, ransomware attacks became more targeted with government, manufacturing and healthcare industries facing the brunt of these attacks. In the second quarter of 2019, we expect hackers to target industries with critical systems that can be compromised. This includes, but is not limited to, finance, energy and legal businesses. With the proper training and tools, we can create an army equipped to detect and respond to the actions of our ancient enemies, protecting our galaxy from ransomware and its high dollar costs.