Cybercrime has always been a thorny issue for all IT professionals, and above all, IT leaders. You probably use training, help desk, and support services to handle the constant flow of attacks, but did you know that attackers are doing the same?
Cybercrime is a big company. Attack programs and payloads are becoming more and more commercialized, many for sale on the dark web. Like other sellers, criminal organizations have a vested interest in keeping their clients happy and offer a variety of support services to get what they need. If you’re unlucky enough to be the victim of a recent ransomware breach, you may have seen the same from the other side. A website with live chat support to keep you away from your hard-earned income.
“The increasing expertise of cybergangs means that CISOs need to implement proper security controls to protect their organizations,” said KnowBe4’s advocate of security awareness. Javvad Malik said. “There is no such thing as’setting and forgetting’. To stay one step ahead of the gang, we need to make continuous improvements.”
Of course, threat intelligence is very important, but information sharing is also important. For too long, commercial organizations have tried to tackle cybercrime alone, but talking to peers and rivals can mean the difference between paying a ransom and never being noticeable in the first place.
“We shouldn’t think about responding to and recovering from incidents later. CISOs know what to do if an incident occurs, including how to notify law enforcement agencies, regulators, customers, partners, employees, and even the media. You need to know, “says Malik.
Enforcement agencies and the government have promised to be strict against cybercrime. Encourage your friends Handle ransomware attacks with the same priority as terrorism etc. Work together in cross-continental activities -And it’s all summed up.
“Recently, I’ve seen law enforcement agencies dismantle large cybercriminal organizations. This is a time-consuming process with international cooperation, but it’s very effective at disrupting criminal activity.
“Just seeing more cybercriminals arrested and sentenced to imprisonment could be a great deterrent to others who may be considering entering the crime as a profession. there is.”
These moves are too slow to discourage the recent trend of ransomware attacks that have swept the world in the last eight months. SolarWinds NS Colonial pipeline, JBS When Kasaya.. The first and last of these were supply chain attacks. By endangering only one company, hackers were able to invade hundreds of victims’ customers.
Although it’s notoriously difficult to secure a supply chain, Malik says there are some useful steps:
- Conducting business impact assessment
- Know and understand all partner organizations
- The contract has appropriate policies and legal provisions
- Communicate clear security needs with partners
- There is a technical guarantee
- Implement a joint incident response plan that plans all responsibilities
- Have an exit strategy to leave a relationship
Some of these attacks, and many others like them, have been successful for phishing and other social engineering tactics. A collaborative culture that encourages employees to talk to IT teams (rather than being silent for fear of punishment) should be the first line of defense when it comes to strengthening the security human base.
Building or changing culture can be a time-consuming and labor-intensive process, but it benefits. However, it is important that everyone, including executives, participate.
“The top-down approach is an ideal approach. CEOs and executives play a major role in creating an organizational culture, but that doesn’t mean that the culture can’t go from bottom-up or middle-out.
“It’s important to remember that building a culture is a slow process and often takes years to incorporate into an organization, so consistency is important.”
Cybercrime is always there, but the way it appears is constantly changing. To effectively combat threats, it is important that both you and your employees are informed and in good communication.
https://www.computing.co.uk/sponsored/4035398/address-mutable-threat-cybercrime How can you deal with the changing threats of cybercrime?