{"id":41734,"date":"2021-09-09T08:41:16","date_gmt":"2021-09-09T12:41:16","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=41734"},"modified":"2023-07-06T03:47:51","modified_gmt":"2023-07-06T07:47:51","slug":"9-advanced-cybersecurity-threats","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/9-advanced-cybersecurity-threats\/41734\/","title":{"rendered":"Why these 9 advanced cyberthreats need your action"},"content":{"rendered":"<p>Tech is now your business \u2013 whatever your business. Senior executives must be thinking of cybersecurity as an urgent strategic issue. But the landscape is jargon-filled and constantly evolving. We explain in everyday language nine of today\u2019s biggest threats to business, so you can be fearless and focus on the future.<\/p>\n<h2>1. Attacking low-hanging clouds<\/h2>\n<p>As businesses use more cloud-based applications and data <a href=\"https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/KHCS_Secure_Your_Move_to_the_Cloud.pdf\" target=\"_blank\" rel=\"noopener nofollow\">storage<\/a>, don\u2019t rely on your cloud provider for security. You need your own cybersecurity too.<\/p>\n<p>Kaspersky research found just <a href=\"https:\/\/www.kaspersky.com\/blog\/understanding-security-of-the-cloud\/\" target=\"_blank\" rel=\"noopener nofollow\">47 percent of enterprises using public cloud have tailored protection<\/a>. Without it, their clouds are vulnerable to expensive data breaches through low-hanging entry points like weak passwords.<\/p>\n<p><strong>What to do:<\/strong><\/p>\n<p>If your business relies on the cloud, cloud security must be a board-level priority. You should also have <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/switching_cybersecurity_questions\/35743\/\" target=\"_blank\" rel=\"noopener nofollow\">endpoint security<\/a> and cybersecurity training as essential budget lines. And remember, you\u2019ll need <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/demystify-cloud-computing\" target=\"_blank\" rel=\"noopener nofollow\">Security-as-a-Service (SaaS) when migrating to the cloud<\/a>.<br>\n<img decoding=\"async\" class=\"alignnone size-full wp-image-43358\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/13172728\/9-cyberthreats-1-1.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>2. Holding your data to ransom<\/h2>\n<blockquote><p>Every day in businesses worldwide, employees find when they try to use work resources, a cybercriminal has locked everything they need and is demanding payment for access.<\/p><\/blockquote>\n<p>It\u2019s called a ransomware attack, and they\u2019re common. Research by IDC showed <a href=\"https:\/\/www.thalesgroup.com\/en\/worldwide\/security\/press_release\/2023-thales-data-threat-report-reveals-increase-ransomware-attacks\" target=\"_blank\" rel=\"noopener nofollow\">a third of businesses had a ransomware attack in the past 12 months<\/a> with an average ransom payment of 250 000 US dollars.<\/p>\n<p><strong>What to do:<\/strong> Pay attention to this type of cybercrime before it happens. <a href=\"https:\/\/www.kaspersky.com\/blog\/structured-approach-ransomware\/37716\/\" target=\"_blank\" rel=\"noopener nofollow\">Plan your organization\u2019s ransomware response<\/a> and get free anti-ransomware tools from <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom.<\/a><br>\n<img decoding=\"async\" class=\"alignnone size-full wp-image-43360\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/13172843\/9-cyberthreats-1-5.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>3. Manipulating your people<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.co.uk\/resource-center\/definitions\/what-is-social-engineering\" target=\"_blank\" rel=\"noopener\">Social engineering<\/a> is a form of cybercrime using techniques to trick employees into handing over sensitive information, spreading malware or giving access to private systems.<\/p>\n<p>It may sound like something no smart employee would fall for, but it happens all the time. <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2019_nine-in-ten-data-breaches-in-the-cloud-caused-by-social-engineering-finds-kaspersky-lab\" target=\"_blank\" rel=\"noopener\">Nine out of 10 cloud data breaches use social engineering<\/a>. These kinds of <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2019_nine-in-ten-data-breaches-in-the-cloud-caused-by-social-engineering-finds-kaspersky-lab\" target=\"_blank\" rel=\"noopener\">attacks can cost an enterprise over 2 million US dollars<\/a>.<\/p>\n<p>As technology gets more sophisticated, so do cybercriminals. Attackers now use artificial intelligence (AI) to manipulate people with sophisticated impersonations. With a \u2018<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/deepfakes-2019\/28954\/\" target=\"_blank\" rel=\"noopener nofollow\">deepfake<\/a>\u2018 impression of someone important like the CEO, cybercriminals can manipulate employees into doing almost anything.<\/p>\n<p><strong>What to do:<br>\n<\/strong><br>\nPeople are your biggest risk and your best defense. Building a <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/security-awareness-business-2019\/29183\" target=\"_blank\" rel=\"noopener nofollow\">cyberaware culture<\/a> throughout your organization defends against social engineering attacks. By <a href=\"https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/cyber-security-awareness-training-whitepaper.pdf\" target=\"_blank\" rel=\"noopener nofollow\">training employees to be more aware of cyberthreats<\/a>, you\u2019ll build safe habits and lower the risk of attack.<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t\t<a href=\"http:\/\/www.kaspersky.com\/enterprise\" class=\"c-promo-product__figure\">\n\t\t\t\t\t<img decoding=\"async\" width=\"130\" height=\"164\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/08104141\/CXO-Guide_1_Banner_inline.png\" class=\"attachment-card-default size-card-default\" alt=\"\" data-src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/08104141\/CXO-Guide_1_Banner_inline.png\" data-srcset=\"\" srcset=\"\">\t\t\t\t<\/a>\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>The Future of Enterprise Security<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Kaspersky, your 1 cybersecurity partner for enterprise security<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"http:\/\/www.kaspersky.com\/enterprise\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">Read more<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<h2>4. Getting in through trusted sources<\/h2>\n<p>In supply chain attacks, cybercriminals insert malicious code into trusted software or hardware. Through this type of attack, they can use any application, software update or equipment as a \u2018Trojan horse\u2019 to launch an attack. The threat may then spread from your system to other companies you work with.<\/p>\n<p><strong>What to do:<\/strong><\/p>\n<p>Empower security from within. Improving <a href=\"https:\/\/eugene.kaspersky.com\/2020\/07\/01\/cyber-hygiene-essential-for-fighting-supply-chain-attacks\" target=\"_blank\" rel=\"noopener\">cyber hygiene<\/a> across the board helps close loopholes like weak passwords, lacking security protocols and insecure software. Read more on <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/supply-chain-attack-evolution\/3216\" target=\"_blank\" rel=\"noopener nofollow\">how to detect and prevent supply chain attacks<\/a>.<br>\n<img decoding=\"async\" class=\"alignnone size-full wp-image-43359\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/13172811\/9-cyberthreats-1-2.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>5. Lying in wait for the right time to strike<\/h2>\n<p>An <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/advanced-persistent-threats\" target=\"_blank\" rel=\"noopener nofollow\">Advanced Persistent Threat (APT)<\/a> involves sneaky, sophisticated hacking techniques.<\/p>\n<blockquote><p>They often hide malicious software in your system for long periods, stealing information or waiting for the moment to cause maximum damage.<\/p><\/blockquote>\n<p>APTs usually target big enterprises or nation-states, but they can also affect smaller companies in the supply chain. Cybersecurity skills cooperative SANS Institute found <a href=\"https:\/\/www.sans.org\/white-papers\/39105\/\" target=\"_blank\" rel=\"noopener nofollow\">48 percent of enterprises say they have a gap in detecting advanced threats<\/a>.<\/p>\n<p><strong>What to do:<\/strong><\/p>\n<p>Arm employees with the knowledge they need to protect your organization. <a href=\"https:\/\/securelist.com\/tag\/apt\" target=\"_blank\" rel=\"noopener\">Get APT threat reports on SecureList<\/a>.<\/p>\n<h2>6. Turning off your business<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/ddos-attacks\" target=\"_blank\" rel=\"noopener nofollow\">Distributed Denial of Service (DDoS) attacks<\/a> are the cybercriminal\u2019s go-to targeted attack. They overwhelm a server, service or network with a flood of traffic, so you can\u2019t give your customers reliable online service. They may aim to essentially shut your company off from network systems like servers, cloud services and websites.<\/p>\n<p><a href=\"https:\/\/www.coxblue.com\/12-ddos-statistics-that-should-concern-business-leaders\/\" target=\"_blank\" rel=\"noopener nofollow\">DDOS attacks can cost 20,000 to 40,000 US dollars per hour<\/a>. There\u2019s reputation and damage to customer relationships on top of direct costs.<\/p>\n<p><strong>What to do:<\/strong><\/p>\n<p>Make sure DDoS attack mitigation is part of your cybersecurity solution. Equip your IT teams with <a href=\"https:\/\/securelist.com\/category\/ddos-reports\/\" target=\"_blank\" rel=\"noopener\">free DDoS reports on SecureList<\/a>.<\/p>\n<h2><img decoding=\"async\" class=\"alignnone size-full wp-image-43361\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/13173006\/9-cyberthreats-1-4.gif\" alt=\"\" width=\"358\" height=\"358\"><br>\n7. Attacking connected \u2018things\u2019<\/h2>\n<p>The Internet of Things (IoT) is a fast-growing ecosystem \u2013 forecasts predict <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">we\u2019ll use more than 75 billion IoT devices by 2025<\/a>.<\/p>\n<p>Connected devices like elevators, sensors and printers are now common in homes and workplaces, and they\u2019re increasingly part of <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">manufacturing and industry processes<\/a>. Many industrial IoT devices run on outdated, vulnerable operating systems, becoming an easy entry point for hackers to bring down a whole business.<\/p>\n<p>Just <a href=\"https:\/\/www.kaspersky.co.uk\/about\/press-releases\/2020_half-of-industrial-organizations-believe-iot-will-transform-ics-security\" target=\"_blank\" rel=\"noopener\">19 percent of companies have active network and traffic monitoring for IoT devices<\/a>.<\/p>\n<p><strong>What to do:<\/strong><\/p>\n<p>Look for solutions that protect IoT by transferring data from industrial equipment to cloud platforms, creating a secure connection between IoT and your corporate network. Read more about how to minimize the <a href=\"https:\/\/www.kaspersky.com\/blog\/rsa2021-dangerous-iot\/40161\" target=\"_blank\" rel=\"noopener nofollow\">risk of attack through IoT devices.<\/a><\/p>\n<h2>8. The most common cyberthreat<\/h2>\n<p><a href=\"https:\/\/www.comparitech.com\/antivirus\/malware-statistics-facts\/\" target=\"_blank\" rel=\"noopener nofollow\">Malware is common<\/a> and fast becoming the most dangerous, costly type of attack for enterprises, which are feeling the effects of serious attacks like <a href=\"https:\/\/www.youtube.com\/watch?v=s3o3qOipHhk\" target=\"_blank\" rel=\"noopener nofollow\">Emotet<\/a> and related ransomware. It damages business operations by stealing, altering and deleting sensitive information or taking control of systems. In the European Union, <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2020-2021-eu-statistics\/102335\/\" target=\"_blank\" rel=\"noopener\">70 percent of internet users\u2019 computers have had at least one malware attack<\/a>.<\/p>\n<p><strong>What to do:<\/strong><\/p>\n<p>Blocking malware attacks is starting to require more advanced threat protection. Read about the <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/endpoint-detection-response-automation\/36541\/\" target=\"_blank\" rel=\"noopener nofollow\">benefits of using Endpoint Detection Response (EDR)<\/a> for automated protection.<br>\n<img decoding=\"async\" class=\"alignnone size-full wp-image-43362\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/13173045\/9-cyberthreats-1-3.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>9. Trouble through doorways<\/h2>\n<p>Endpoints are the \u2018doorways\u2019 your employees use to access business data and systems, like laptops, mobile phones and servers. Cybercriminals love to attack them.<\/p>\n<p>In 2019, <a href=\"https:\/\/www.securityinfowatch.com\/cybersecurity\/press-release\/21123576\/ponemon-institute-ponemon-institute-reveals-68-of-organizations-were-victims-of-successful-endpoint-attacks-in-2019\" target=\"_blank\" rel=\"noopener nofollow\">68 percent of organizations had one or more endpoint attack<\/a> that compromised data. And with the new reality of employees working from home, organizations must further strengthen their endpoint security.<\/p>\n<p><strong>What to do:<\/strong><\/p>\n<p>To protect office-based, remote and hybrid workers, consider <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/managed-endpoint-detection-response\/36539\/\" target=\"_blank\" rel=\"noopener nofollow\">Endpoint Detection and Response (EDR)<\/a> to monitor endpoints continually. Read more about how <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/system-hardening-reduce-cyberattacks\/35812\" target=\"_blank\" rel=\"noopener nofollow\">strengthening cybersecurity for remote working can reduce cyberattacks<\/a>.<\/p>\n<h2>How to get ahead of advanced threats<\/h2>\n<p>Advanced cyberthreats are common and have a big impact on business reputation and bottom line. When business leaders take action on cybersecurity, they\u2019re safeguarding their business and avoiding spending more time later to mop up damage from a cyberattack.<\/p>\n<p><a href=\"https:\/\/go.kaspersky.com\/onepartner\" target=\"_blank\" rel=\"noopener nofollow\"><u>Kaspersky\u2019s stage-by-stage cybersecurity framework<\/u><\/a> keeps your enterprise safe from all common, pervasive and financially damaging threats.<\/p>\n<p>Find out more and sign up for the latest enterprise cybersecurity report from Kaspersky produced in partnership with the commercial department of the Financial Times.<\/p>\n<div class=\"interactive\"><form id=\"mktoForm_27980\"><\/form><script>MktoForms2.loadForm(\"\/\/app-sj06.marketo.com\", \"802-IJN-240\", 27980, function(form) {\n                form.onSuccess(function(values, tyURL){\n                    \/\/Take the lead to a different page on successful submit, ignoring the forms configured tyURL.\n                    location.href = \"http:\/\/www.kaspersky.com\/enterprise\";\n                    dataLayer.push({\n                        'event': 'addEvents_makeConversions',\n                        'event_id': 'd-n01-e11',\n                        'conversion_name': 'Marketo Form',\n                        'conversion_step': 'Form Fill Out',\n                        'conversion_param': jQuery(location).attr(\"href\"),\n                        'eventCallback' : function() {\n                            jQuery(location).attr('href',\"http:\/\/www.kaspersky.com\/enterprise\");\n                        }\n                    });\n                    \/\/return false to prevent the submission handler continuing with its own processing\n                    return false;\n                  });\n            });<\/script><\/div><!-- RECAPTCHA -->\n        <style>.googleRecaptcha { padding: 20px !important; }<\/style>\n        <script>\n            var GOOGLE_RECAPTCHA_SITE_KEY = '6Lf2eUQUAAAAAC-GQSZ6R2pjePmmD6oA6F_3AV7j';\n\n            var insertGoogleRecaptcha = function (form) {\n            var formElem = form.getFormElem().get(0);\n\n            if (formElem && window.grecaptcha) {\n                var div = window.document.createElement('div');\n                var divId = 'g-recaptcha-' + form.getId();\n                var buttonRow = formElem.querySelector('.mktoButtonRow');\n                var button = buttonRow ? buttonRow.querySelector('.mktoButton[type=\"submit\"]') : null;\n\n                var submitHandler = function (e) {\n                var recaptchaResponse = window.grecaptcha && window.grecaptcha.getResponse(widgetId);\n                e.preventDefault();\n\n                if (form.validate()) {\n                    if (!recaptchaResponse) {\n                    div.setAttribute('data-error', 'true');\n                    } else {\n                    div.setAttribute('data-error', 'false');\n\n                    form.addHiddenFields({\n                        reCAPTCHAFormResponse: recaptchaResponse,\n                    });\n\n                    form.submit();\n                    }\n                }\n                };\n\n                div.id = divId;\n                div.classList.add('googleRecaptcha');\n\n                if (button) {\n                button.addEventListener('click', submitHandler);\n                }\n\n                if (buttonRow) {\n                formElem.insertBefore(div, buttonRow);\n                }\n\n                if (window.grecaptcha.render) {\n                    var widgetId = window.grecaptcha.render(divId, {\n                    sitekey: GOOGLE_RECAPTCHA_SITE_KEY,\n                });\n                formElem.style.display = '';\n                }\n            }\n            };\n\n            function onloadApiCallback() {\n            var forms = MktoForms2.allForms();\n            for (var i = 0; i < forms.length; i++) {\n                insertGoogleRecaptcha(forms[i]);\n            }\n            }\n\n            (function () {\n            MktoForms2.whenReady(function (form) {\n                form.getFormElem().get(0).style.display = 'none';\n                jQuery.getScript('\/\/www.google.com\/recaptcha\/api.js?onload=onloadApiCallback');\n            });\n            })();\n        <\/script>\n        <!-- END RECAPTCHA -->\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks are the single biggest threat to enterprises today. Forewarned is forearmed, so here\u2019s a bite-size list of attacks you need to know about.<\/p>\n","protected":false},"author":2633,"featured_media":42231,"template":"","coauthors":[4046],"class_list":{"0":"post-41734","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-category-safer-business","8":"emagazine-tag-business-cybersecurity","9":"emagazine-tag-cybersecurity-advice"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/9-advanced-cybersecurity-threats\/41734\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-futures-magazine\/9-advanced-cybersecurity-threats\/25338\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-futures-magazine\/9-advanced-cybersecurity-threats\/20088\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/41734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/42231"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=41734"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=41734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}