Video | Agriculture | Confidence | Economy | Energy | Employment | Finance | Media | Property | RBNZ | Science | SOEs | Tax | Technology | Telecoms | Tourism | Transport | Search

 


Top 7 SMB Information Protection Predictions for 2013

News Release

Top 7 SMB Information Protection Predictions for 2013

For small-and medium-sized businesses (SMBs), 2012 will be known as the year hackers identified SMBs as stepping stones into larger, more lucrative targets. We saw the number of targeted attacks aimed at businesses with fewer than 250 employees double, climbing to 36 percent of all targeted attacks by mid-year. We also spotted some interesting trends among a new class of SMB, the accidental entrepreneurs, who are poised for explosive growth and aggressively leverage technology such as cloud computing to fast-track their success

Now as this year comes to an end, we turn our attention to what we expect will happen in the world of SMB information protection in 2013. While targeted attacks against SMBs will not let up, we’ll see SMBs fall victim to not only other cyber conflict but also of their own lack of preparation.

So, as you prepare your business for the New Year, here are the seven SMB trends Symantec recommends you keep in mind to protect your vital business information:

1. RANSOMWARE IS THE NEW SCAREWARE
2.
As fake antivirus begins to fade as a criminal enterprise, a new and harsher model will continue to emerge – ransomware.

Ramsomware goes beyond attempting to fool its victims; it attempts to intimidate and bully them. While this “business model” has been tried before, it suffered from the same limitations of real-life kidnapping: there was never a good way to collect the money. Cybercriminals have now discovered a solution to this problem: using online payment methods. They can now use force instead of flim-flam to steal from their targets, and we can expect the extortion methods to get harsher and more destructive.

In 2013, attackers will use more professional ransom screens, up the emotional stakes to motivate their victims and use methods that make it harder to recover from an infection. In addition to targeting consumers, attackers will use ransomware to hold small businesses’ data and systems hostage. You can read more about ransomware in this new research: Ransomware: A Growing Menace.

3. CYBER CONFLICT BECOMES THE NORM
4.
In 2013 and beyond, conflicts between nations, organisations and individuals will play a key role in the cyber world. Espionage can be very successful and deniable when conducted online. Any nation-state not understanding this previously has been given many examples in the last two years. Nations or organised groups of individuals will continue to use cyber tactics in an attempt to damage or destroy secure information or funds, of its targets. In 2013, we will see the cyber equivalent of saber rattling, where nation-states, organisations and even groups of individuals use cyber attacks to show their strength and “send a message”.

Additionally, we expect more conflict-related attacks on individuals and non-government groups, such as supporters of political issues and members of minority groups in conflict. A representation of this is the type of targeting that currently is common when hactivist groups are aggravated by an individual or company. SMBs should prepare to be targeted by these groups as a backdoor into other targets.

5. THE 100 PERCENT VIRTUALISED SMB BECOMES MORE COMMON
6.
Organisations of all sizes will evaluate and adopt multiple hypervisors into their virtualisation and computing environments, as the market share of hypervisor vendors will begin to balance out between the largest vendors. This hypervisor diversity will cause specific hypervisor point tools to be ripped out and replaced by platforms with more capabilities that support multiple hypervisors, physical, virtual, snapshot and cloud-based infrastructures for backup, recovery and management. This will lead to more SMBs becoming 100 percent virtualised and using multiple hypervisors in both testing and production environments.

As a result, these SMBs will see a positive effect to their disaster preparedness. Virtualisation and cloud computing work hand-in-hand with a comprehensive backup and recovery plan to improve disaster preparedness, with the ability to have off-site storage and physical machines quickly available in a virtual environment if a disaster were to occur. Symantec research shows that 71 percent of SMBs that have adopted server virtualisation report improved disaster preparedness, as well as 41 percent using public cloud and 43 percent using private cloud.

7. MADWARE ADDS TO THE INSANITY
8.
Mobile adware, or “madware,” is a nuisance that disrupts user experience and can potentially expose location details, contact information and device identifiers to cybercriminals. Madware, which sneaks onto a users’ phone when they download an app, most often takes the form of sending pop-up alerts to the notification bar on mobile devices, adding icons to the devices, changing browser settings and gathering personal information.

In just the past nine months, the number of apps including the most aggressive forms of madware has increased by 210 percent. Because location and device information can be legitimately collected by advertising networks – as it helps them target users with appropriate advertising – we expect increased use in madware as more and more companies seek to drive revenue growth through mobile ads. This includes a more aggressive and potentially malicious approach towards the monetisation of “free” mobile apps.


9. MONETISATION OF SOCIAL NETWORKS INTRODUCES NEW DANGERS
10.
Just like consumers, SMBs place a high level of trust in social media, with 63 percent of SMBs now using social networks to market their goods and services, and engage with customers. As these networks start finding new ways to monetise their platforms by allowing members to buy and send real gifts, the growing social spending trend also provides cybercriminals with new ways to lay the groundwork for attack.

Symantec anticipates an increase in malware attacks that steal payment credentials in social networks and trick users into providing payment details, and other personal and potentially valuable information, to fake social network clients – which may include fake gift notifications and emails requesting home addresses and other personal information. While providing non-financial information might seem innocuous, cybercriminals sell and trade this information with one another to combine with information they already have about you, helping them create a profile of you they can use to gain access to your other accounts.

These new dangers in social networks only compound the problem for SMBs, 87 percent of which do not have formal written internet security policy for employees. Despite the fact that social networks are an increasingly popular vector for phishing attacks, 70 percent of SMBs do not have policies for employee social media use. In 2013, lack of security policy and best practices, such as educating employees, will come back to bite SMBs.

11. AS USERS SHIFT TO MOBILE AND CLOUD, SO WILL ATTACKERS
12.
Attackers will go where users go, so it should come as no surprise that mobile platforms and cloud services will be high-risk targets for attacks and breaches in 2013. The rapid rise in malware on Android in 2012 confirms this.

As unmanaged mobile devices and BYOD at companies of all sizes continue to enter and exit corporate networks, they pick up data and this info tends to become stored in other clouds, increasing the opportunity and risk for breaches and targeted attacks on mobile device data. Also, as users add applications to their phones they will pick up malware.

Some mobile malware duplicates old threats, like stealing information from devices. Today mobile malware sends premium text messages to accounts bad guys profit from. In 2013, you can be sure mobile technology will continue to advance and thereby create new opportunities for cybercriminals. For example, as eWallet technology becomes more widely used, it will become yet another platform hackers attempt to exploit. Just as we saw the Firesheep threat emerge to take advantage of Wi-Fi users, we will see malware in use by criminals to hijack payment information from people in a retail environment. Some payment systems are widely used by tech novices, both users and businesses, and may have vulnerabilities allowing information to be stolen.

13. CLOUD OUTAGES GET WORSE BEFORE GETTING BETTER
14.
There will be a significant increase in cloud outages in 2013, resulting in millions of dollars lost, yet companies will continue to pour resources into cloud offerings. The need to manage and protect data SMBs put in the cloud will lead to more adoption of backup and disaster recovery appliances and cloud service providers will begin to innovate more secure and efficient recovery of data and applications. Companies of all sizes will need to adopt these better cloud management tools to protect their data because cloud outage problems will get worse before they get better – infrastructures that have scaled quickly with hand-written code and that utilise inefficient shared resources will result in major outages and some black eyes for the cloud computing market. For SMBs, cloud outages and the resulting downtime can be devastating, even if a critical app goes down for just a short time – the median cost of downtime for an SMB is USD$12,500 per day.

We believe 2013 promises to be an exciting year for SMBs. Beyond the challenges you’ll face protecting information, you’ll also see great opportunities to leverage new technologies for the benefit of your business. To start the New Year out on the right foot, Symantec offers the following e-ssential tips:

Know what you need to protect: One data breach could mean financial ruin for an SMB. Look at where your information is being stored and used, and protect those areas accordingly.

Enforce strong password policies: Passwords with eight characters or more and use a combination of letters, numbers and symbols (e.g., # $ % ! ?) will help protect your data.

Map out a disaster preparedness plan today: Don't wait until it's too late. Identify your critical resources, use appropriate security and backup solutions to archive important files, and test frequently.

Encrypt confidential information: Implement encryption technologies on desktops, laptops and removable media to protect your confidential information from unauthorised access, providing strong security for intellectual property, customer and partner data.

Use a reliable security solution: Today's solutions do more than just prevent viruses and spam; they scan files regularly for unusual changes in file size, programs that match known malware, suspicious email attachments and other warning signs. It's the most important step to protect your information.

Protect Information Completely: It's more important than ever to back up your business information. Combine backup solutions with a robust security offering to protect your business from all forms of data loss.

Stay up to date: A security solution is only as good as the frequency with which it is updated. New viruses, worms, Trojan horses and other malware are born daily, and variations of them can slip by software that is not current.

Educate employees: Develop internet security guidelines and educate employees about internet safety, security and the latest threats, as well as what to do if they misplace information or suspect malware on their machine.

ends

© Scoop Media

 
 
 
 
 
Business Headlines | Sci-Tech Headlines

 

Power Outages, Roads Close: Easter Storm Moving Down Country

The NZ Transport Agency says storm conditions at the start of the Easter break are making driving hazardous in Auckland and Northland and it advises people extreme care is needed on the regions’ state highways and roads... More>>

ALSO:

Houses (& Tobacco) Lead Inflation: CPI Up 0.3% In March Quarter

The consumers price index (CPI) rose 0.3 percent in the March 2014 quarter, Statistics New Zealand said today. Higher tobacco and housing prices were partly countered by seasonally cheaper international air fares, vegetables, and package holidays. More>>

ALSO:

Notoriously Reliable Predictions: Budget To Show Rise In Full-Time Income To 2018: English

This year’s Budget will forecast wage increases through to 2018 amounting to a $10,500 a year increase in average full time earnings over six years to $62,200 a year, says Finance Minister Bill English in a speech urging voters not to “put all of this at risk” by changing the government. More>>

ALSO:

Prices Up, Volume Down: March NZ House Sales Drop 10% As Loan Curbs Bite

New Zealand house sales dropped 10 percent in March from a year earlier as the Reserve Bank’s restrictions on low-equity mortgages continue to weigh on sales of cheaper property. More>>

ALSO:

Scoop Business: Chorus To Appeal Copper Pricing Judgment

Chorus will appeal a High Court ruling upholding the Commerce Commission’s determination setting the regulated prices on the telecommunications network operator’s copper lines. More>>

ALSO:

Earlier:

Cars: Precautionary Recalls Announced For Toyota Vehicles

Toyota advises that a number of its New Zealand vehicles are affected by a series of precautionary global recalls. Toyota New Zealand General Manager Customer Services Spencer Morris stressed that the recalls are precautionary. More>>

ALSO:

'Gardening Club': Air Freight Cartel Nets Almost $12 Million In Penalties

The High Court in Auckland has today ordered Swiss company Kuehne + Nagel International AG to pay a penalty of $3.1 million plus costs for breaches of the Commerce Act. Kuehne + Nagel’s penalty brings the total penalties ordered in this case to $11.95 million ... More>>

ALSO:

Crown Accounts: Revenue Below Projections

Core Crown tax revenue has increased by $1.9 billion (or 5.0%) compared to the same time last year. However this was $1.1 billion less than expected and is reflected across most tax types, continuing the pattern of recent months. More>>

ALSO:

Get More From Scoop

 
 
Computer Power Plus
 
 
 
 
 
 
 
 
Business
Search Scoop  
 
 
Powered by Vodafone
NZ independent news