Cybersecurity is the biggest growing business in the world, as it is required to keep safe the online lives of thousands of people every day. Many of us do not think about our online security, cause well, there are many companies working to keep you safe every day; but there are also companies out there that are scheming to scam you out of money, information, or property.
The top five threats are phishing, cloud ware attacks, mobile malware, ransomware attacks, and insider threats. Phishing is where a hacker pretends to be someone like our company or our bank; but the email address is often slightly altered. In the email, they send a link that requires you to enter your personal information, and in 2019, phishing was responsible for 32% of confirmed data breaches and 78% of all cybercrimes. These cybercriminals managed to create phishing schemes through companies’ cloud applications. This is a top priority security detail to watch for in 2021.
The second type of attack is cloud jacking, meaning there is infiltration by a third party in the company cloud computing. Upon the hacker infiltrating the company cloud, they attempt to reconfigure the cloud code, attempting to take control of the entire company cloud and gain access to sensitive company details. This creates the perfect opportunity for hackers to create a phishing attack from within the company.
Next up are the malware attacks, because many people are moving to remote work, those working with the company that are open to attacks by using unknown WIFI networks. Think that it is okay to just use that public network at that coffee shop just once? Think again, it is not just playing games on an unknown network, but also working on an unknown network that leaves you and your device vulnerable to malware attacks. This type of cyberattack is aimed specifically at mobile devices to gain sensitive company data are that is being accessed and stored on mobile devices.
Fourth on the list is ransomware is an increasing plague for business for several years now. The most successful attacks have caused the lose of millions of dollars in ransom payments, which encourages hackers to continue to use and refine these attacks. According to a McAfee prediction report, the process on the dark web to purchase ransomware kits is much easier; also the software for ransomware is becoming increasingly more sophisticated. Also, the ransomwares are beginning to consolidate to form powerhouse; meaning that one attack causes even greater costs from downtime.
Lastly, there are the insider threats, or threats posed by employees, this is affecting 34% of businesses around the world. This is caused by employees intentionally or accidentally hurting the company, out of ignorance or negligence. With the increase of employees going to remote work, creates additional risks, meaning extra precautions are to be taken curb insider threats. However, there are specialized tools that detect unauthorized logins, new apps installed on locked computers, newly granted authorization accesses, and restricted networks that have new devices on them. Also, routine cybersecurity training should be provided to employees to prevent mistakes before they happen.
In the restaurant business, there is cloud storage of employee data, a website, mobile ordering, as well as Instagram and Facebook pages. As mentioned in the five pervious paragraphs, unintentional leaks and hijacking are means of attacking the company, and Facebook hacking has become an even bigger thing. Why just within the last month, a friend of mine had their Facebook account hacked into by someone in an attempt to control the account.
As the Chief Tech Executive, I recommend giving employees routine cybersecurity training, using VPNs for sensitive data, and having a cloud storage that is only accessible by VPN, for sensitive data using one time passwords that are given based on employee privileges’, also using encrypted email and data for highly sensitive data. When employees are doing work, they have use known networks or data to work company projects. These are some of the ways to protect data and there are thousands of more ways to protect the company. See Computer Security Threats for more information.