{"id":37866,"date":"2020-12-07T07:47:34","date_gmt":"2020-12-07T12:47:34","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=37866"},"modified":"2020-12-08T02:32:12","modified_gmt":"2020-12-08T07:32:12","slug":"global-cybersecurity-priorities","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/global-cybersecurity-priorities\/37866\/","title":{"rendered":"COVID-19 has changed global cybersecurity. What must nations do now?"},"content":{"rendered":"<p>During the pandemic, lockdowns and \u2018shelter in place\u2019 orders around the world have done much good. They\u2019ve not only saved lives, they\u2019ve shown us our cities without pollution and let businesses realize employees working from home can be more business benefit than business challenge.<\/p>\n<blockquote><p>While many were preoccupied with keeping the kids busy, perfecting their breadmaking skills or pulling relatives back from the conspiracy theory cliff, we saw cybercriminals doing their own kind of \u2018working from home\u2019.<\/p>\n<\/blockquote>\n<p>I spoke about the growing cyberthreat landscape and what we must do about it as part of a high-level leaders discussion on international cybersecurity during the <a href=\"https:\/\/www.intgovforum.org\/vIGF\/\" target=\"_blank\" rel=\"noopener nofollow\">United Nations Internet Governance Forum (IGF) 2020<\/a>.<\/p>\n<p>During the pandemic, cybercriminals used new-found time to hone their skills and test out new methods. We saw a sharp rise in cybercrime of all kinds, from malware to advanced persistent threats (APT.) New hacking groups came on the scene, and with them, new kinds of attacks.<\/p>\n<h2>New attacks and actors unmasked<\/h2>\n<p>Here\u2019s just a sample of the expansion of cybercrime our researchers detected since the coronavirus pandemic came into our lives.<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">SECURE FUTURES<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>What's coming next?<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Be first to find out what\u2019s happening in tech, leadership and cybersecurity.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"#modal_newsletter\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener\">Stay ahead<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<p>This year we\u2019ve seen unique malicious file detection\u00a0rise 20 to 25\u00a0percent a day. Most threats, like malware, are relatively easy to deal with. But when what we\u2019re seeing is a rise in more professional cybercrime gangs, that\u2019s a different story. Kaspersky researchers are now monitoring more than 200 cybercrime gangs who\u2019ve been launching hyper-targeted attacks against targets such as banks and governments. We\u2019ve also seen more \u2018juniors\u2019 entering cybercrime. While they\u2019re easy to stop now, many will graduate from hacker kindergarten and join the pros.<\/p>\n<blockquote><p>One of my biggest concerns is the potential for this new scale of cybercrime to become adept at damaging nations\u2019 critical infrastructure.<\/p>\n<\/blockquote>\n<p>With the increasing use of the <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/internet-of-things\/\" target=\"_blank\" rel=\"noopener nofollow\">internet of things<\/a>, the number of points where cybercriminals can attack has grown exponentially. We know they\u2019re willing and able. Take, for example, one of the most successful global attacks, the <a href=\"https:\/\/www.kaspersky.com\/blog\/iot-ddos\/6210\/\" target=\"_blank\" rel=\"noopener nofollow\">2016 Mirai malware attack<\/a> on domain name system provider Dyn. It took down hundreds of news websites around the world.<\/p>\n<h2>How should nations respond to the new threat landscape?<\/h2>\n<p>The cybersecurity impact of the pandemic has two parts. First, people are at greater risk of cyber-intrusion thanks to working from home and spending more time online. Second, there are more cybercriminals, and they\u2019ve become better at what they do.<\/p>\n<p>Meanwhile, the digital economy has been growing fast. Many businesses decided to use the breathing space and necessity of the pandemic to digitalize new parts of their business. So we\u2019re at a place and time when organizations and their customers need to feel confident in these new ways of buying and delivering services. Building that confidence will help economies thrive. So how do we get there? I\u2019ve got three priorities.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/TkXQF7zAwu4?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><em>Leaders discuss international cybersecurity in the United Nations Internet Governance Forum (IGF) 2020<\/em><\/p>\n<h3>1.\u00a0Secure technology by design<\/h3>\n<p>We can make technologies much more difficult and expensive to compromise, but they must be designed that way from the start. We have operating systems in devices already on the market that are so secure we had to devise a new way of talking about them \u2013 so we call this <a href=\"https:\/\/www.youtube.com\/watch?v=BbhoVy9Y_LI\" target=\"_blank\" rel=\"noopener nofollow\">cyber-immunity<\/a>. The chances of an attack on these systems succeeding means the cost to the criminal of a successful cyberattack is higher than the damage caused. To make critical infrastructure safer, we could deploy cyber-immune technologies across the network. The time to do it is now.<\/p>\n<h3>2. Enforcing cybersecurity law on an international level<\/h3>\n<p>International cooperation is crucial for hunting down cybercriminals, but it looks as though the world isn\u2019t going in a \u2018cooperation\u2019 direction \u2013 it\u2019s becoming more fragmented. We need a space in cybersecurity where nations can cooperate safely, without geopolitical fractures getting in the way.<\/p>\n<h3>3. High-level cooperation requires high-level cybersecurity education<\/h3>\n<p>As well as needing to overcome our differences, international cooperation against cybercrime will require \u2018cyber diplomats\u2019 to stay continually informed about the changing threat landscape.<\/p>\n<p>Good news for those imagining a boring slide talk in a dark basement \u2013 cybersecurity education keeps pace with innovation and developments in learning science. For example, learning through <a href=\"https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/KL_SA_KIPS_overview_A4_Eng_web.pdf\" target=\"_blank\" rel=\"noopener nofollow\">immersive gamified simulations like Kaspersky Interactive Protection Simulation (KIPS)<\/a> is popular and effective.<\/p>\n<p>While the world recovers from the shocks of the COVID-19 pandemic, we must recognize much has changed, not least in cyberthreats. We need a new era of international cooperation to hunt cybercriminals. We need to make sure \u2018cyber diplomats\u2019 (those who develop and enforce national and international policy against cybercrime) fully understand the threats.<\/p>\n<p>As professional cybercrime gangs hone their skills, I predict we\u2019ll see cyberattacks grow at every level, harming business and governments. Thankfully, technology keeps evolving, and no one is powerless. Adopting cyber-immune systems will help nations keep the lights, water and internet running at times of crisis and beyond.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>People are more vulnerable to cyber intrusion, cybercriminals have honed their skills, and threats have skyrocketed. Eugene Kaspersky has three priorities.<\/p>\n","protected":false},"author":2626,"featured_media":37926,"template":"","coauthors":[3981],"class_list":{"0":"post-37866","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-internet-of-things","7":"emagazine-category-leadership","8":"emagazine-category-trends","9":"emagazine-tag-covid-19","10":"emagazine-tag-infrastructure","11":"emagazine-tag-malware","12":"emagazine-tag-working-from-home"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/global-cybersecurity-priorities\/37866\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/global-cybersecurity-priorities\/23836\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-futures-magazine\/global-cybersecurity-priorities\/21216\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-futures-magazine\/global-cybersecurity-priorities\/17027\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/37866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/37926"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=37866"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=37866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}