According to IDC, 66% of CEOs will have digital transformation at the heart of their corporate strategy, but 70% of siloed digital transformation initiatives will fail by 2018.
This means that if organisations are to implement successful security strategies, they will have to ensure that these initiatives are at the core of the overall digital transformation of the company.
Research released at the recent 2016 IDC IT Security Roadshow showed that CIOs put cyber security and privacy technologies at the top of the list of technology priorities to support digital transformation. 85 percent of South African organisations surveyed also stated that they have plans to implement advanced security solutions by 2017.
Says Ido Naor, Senior Researcher in the Global Research and Analysis team at Kaspersky Lab: “Ransomware attacks are definitely on the increase and this is something that Kaspersky Lab anticipated two to three years ago already. Couple this with new ransomware variants that keep multiplying themselves and the fact that attacks are not being limited to specific industries or necessarily have mitigation and you have a major battle on your hands.”
“We are also seeing growth in mainly Android malware, particularly when large events take place such as the Olympics in Rio and the Euro Cup, during which users are more likely to download apps to keep abreast with the latest news about the events.”
When the attacker becomes the target
Targeted attacks by organised groups also continue to evolve. Continues Naor: “A year ago at the Kaspersky Security Analyst summit, we revealed a very sophisticated group, which uses targeted attacks against governments, military, telecoms, aerospace and more, called Equation, operating since 2001. Subsequent to that, a group that calls itself The Shadow Brokers announced that they had stolen malware code from the Equation Group, which led to the release of the tools and script they use and vulnerabilities they had discovered and kept in order to use again as part of their attack.”
So how do you protect yourself?
Awareness is still the most traditional, yet effective method of protecting an organisation. Adds Naor: “Ensure that every employee in the company is aware of the existence of malware in general and educate them about the growing danger of ransomware and what some of the scenarios are to look out for. Basically, it is about teaching users or employees not to open suspicious emails or click on links they are not familiar with or which are not intended specifically for them. Also teach them not to use their corporate email when registering for services online. In addition, IT and security managers should apply security procedures that restricts malware from spreading from one machine to the other, by enforcing user group policies and segmented networks within the corporate LAN.”
While awareness certainly has an important role to play, organisations of all sizes also have to invest in security solutions to protect themselves. “You need to ensure that every entry and exit point for your organisation is secure. This includes protection at the endpoint and on the server side. It is also important to monitor encryption attacks through components such as a system watcher, which will enable you to revert back to the place where the station is not compromised.”
But what about the general consumer?
The proliferation of mobile devices on the African continent and an increase in Android malware means that individuals can also be at risk. Firstly, mobile users should make sure their device is updated at all times and they are using the latest version of their operating system on their phone. Secondly, they should be aware of what types of applications they are downloading and ensure they only download apps from credible sources such as their relevant app store and not from links that are being distributed via email or on social networks.
“I would recommend watching what you download. As mentioned earlier, big events often rely on apps to disseminate information to visitors, which creates an opportunity for attackers. So, if you are going to download an event-specific app or a trending game like Pokémon GO, make sure you have downloaded the right app from a reputable, valid source and that you are not downloading something that looks similar.”
Nowadays one cannot even rely on reviews to determine authenticity as these apps will often have good reviews, because the hackers know how to buy reviews or get reviews from compromised victims.
Where to from here and beyond?
“I believe that every cycle of an emerging attack trend or cycle of threats takes time to eliminate. We do find that in some regions, cyber security is taken more seriously. It also depends on the industry affected, as we find that the telecommunications, military and government sectors take these breaches far more seriously than for example retail. On a general note, we know that cyber threats are around and that they are going to get more severe, but there are security companies out there that are doing all they can to protect users. Collaboration will be key in fighting the scourge, though. So, for example, when Facebook faced a malware issue, we worked with them to create a plug-in to clean your machine if you were infected. Our best arsenal in the fight against cyber attacks will be collaboration, constant research and continuously retracing the attackers to make sure fewer people will fall victim to these attacks.” says Naor.
Now download a bank account
Absa has introduced an end-to-end account opening for new customers, through the Absa Banking App, which can be downloaded from the Android and Apple app stores. This follows the launch of the world first ChatBanking on WhatsApp service.
This “download your account” feature enables new customers to Absa, to open a Cheque account, order their card and start transacting on the Absa Banking App, all within minutes, from anywhere and at any time, by downloading it from the App stores.
“Overall, this new capability is not only expected to enhance the customer’s digital experience, but we expect to leverage this in our branches, bringing digital experiences to the branch environment and making it easier for our customers to join and bank with us regardless of where they may be,” says Aupa Monyatsi, Managing Executive for Virtual Channels at Absa Retail & Business Banking.
“With this innovation comes the need to ensure that the security of our customers is at the heart of our digital experience, this is why the digital onboarding experience for this feature includes a high-quality facial matching check with the Department of Home Affairs to verify the customer’s identity, ensuring that we have the most up to date information of our clients. Security is supremely important for us.”
The new version of the Absa Banking App is now available in the Apple and Android App stores, and anyone with a South African ID can become an Absa customer, by following these simple steps:
- Download the Absa App
- Choose the account you would like to open
- Tell us who you are
- To keep you safe, we will verify your cell phone number
- Take a selfie, and we will do facial matching with the Department of Home Affairs to confirm you are who you say you are
- Tell us where you live
- Let us know what you do for a living and your income
- Click Apply.
How we use phones to avoid human contact
A recent study by Kaspersky Lab has found that 75% of people pick up their connected device to avoid conversing with another human being.
Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much-needed comfort blanket in a variety of social situations when they do not want to interact with others. A recent survey from Kaspersky Lab has confirmed this trend in behaviour after three-quarters of people (75%) admitted they use a device to pretend to be busy when they don’t want to talk to someone else, showing the importance of keeping connected devices protected under all circumstances.
Imagine you’ve arrived at a bar and you’re waiting for your date. The bar is busy, and people are chatting all around you. What do you do now? Strike up a conversation with someone you don’t know? Grab your phone from your pocket or handbag until your date arrives to keep yourself busy? Why talk to humans or even make eye-contact with someone else when you can stare at your connected device instead?
The truth is, our use of devices is making it much easier to avoid small talk or even be polite to those around us, and new Kaspersky Lab research has found that 72% of people use one when they do not know what to do in a social situation. They are also the ‘go-to’ distraction for people even when they aren’t trying to look busy or avoid someone’s eye. 46% of people admit to using a device just to kill time every day and 44% use it as a daily distraction.
In addition to just being a distraction, devices are also a lifeline to those who would rather not talk directly to another person in day-to-day situations, to complete essential tasks. In fact, nearly a third (31%) of people would prefer to carry out tasks such as ordering a taxi or finding directions to where they need to go via a website and an app, because they find it an easier experience than speaking with another person.
Whether they are helping us avoid direct contact or filling a void in our daily lives, our constant reliance on devices has become a cause for panic when they become unusable. A third (34%) of people worry that they will not be able to entertain themselves if they cannot access a connected device. 12% are even concerned that they won’t be able to pretend to be busy if their device is out of action.
Dmitry Aleshin, VP for Product Marketing, Kaspersky Lab said, “The reliance on connected devices is impacting us in more ways than we could have ever expected. There is no doubt that being connected gives us the freedom to make modern life easier, but devices are also vital to help people get through different and difficult social situations. No matter what your ‘connection crutch’ is, it is essential to make sure your device is online and available when you need it most.”
To ensure your device lifeline is always there and in top health – no matter what the reason or situation – Kaspersky Security Cloud keeps your connection safe and secure:
· I want to use my device while waiting for a friend – is it secure to access the bar’s Wi-Fi?
With Kaspersky Security Cloud, devices are protected against network threats, even if the user needs to use insecure public Wi-Fi hotspots. This is done through transferring data via an encrypted channel to ensure personal data safety, so users’ devices are protected on any connection.
· Oh no! I’m bored but my phone’s battery is getting low – what am I going to do?
Users can track their battery level thanks to a countdown of how many minutes are left until their device shuts down in the Kaspersky Security Cloud interface. There is also a wide-range of portable power supplies available to keep device batteries charged while on-the-go.
· I’ve lost my phone! How will I keep myself entertained now?
Should the unthinkable happen and you lose or have your phone stolen, Kaspersky Security Cloud can track and protect your device from data breaches, for complete peace of mind. Remote lock and locate features ensure your device remains secure until you are reunited.