According to IDC, 66% of CEOs will have digital transformation at the heart of their corporate strategy, but 70% of siloed digital transformation initiatives will fail by 2018.
This means that if organisations are to implement successful security strategies, they will have to ensure that these initiatives are at the core of the overall digital transformation of the company.
Research released at the recent 2016 IDC IT Security Roadshow showed that CIOs put cyber security and privacy technologies at the top of the list of technology priorities to support digital transformation. 85 percent of South African organisations surveyed also stated that they have plans to implement advanced security solutions by 2017.
Says Ido Naor, Senior Researcher in the Global Research and Analysis team at Kaspersky Lab: “Ransomware attacks are definitely on the increase and this is something that Kaspersky Lab anticipated two to three years ago already. Couple this with new ransomware variants that keep multiplying themselves and the fact that attacks are not being limited to specific industries or necessarily have mitigation and you have a major battle on your hands.”
“We are also seeing growth in mainly Android malware, particularly when large events take place such as the Olympics in Rio and the Euro Cup, during which users are more likely to download apps to keep abreast with the latest news about the events.”
When the attacker becomes the target
Targeted attacks by organised groups also continue to evolve. Continues Naor: “A year ago at the Kaspersky Security Analyst summit, we revealed a very sophisticated group, which uses targeted attacks against governments, military, telecoms, aerospace and more, called Equation, operating since 2001. Subsequent to that, a group that calls itself The Shadow Brokers announced that they had stolen malware code from the Equation Group, which led to the release of the tools and script they use and vulnerabilities they had discovered and kept in order to use again as part of their attack.”
So how do you protect yourself?
Awareness is still the most traditional, yet effective method of protecting an organisation. Adds Naor: “Ensure that every employee in the company is aware of the existence of malware in general and educate them about the growing danger of ransomware and what some of the scenarios are to look out for. Basically, it is about teaching users or employees not to open suspicious emails or click on links they are not familiar with or which are not intended specifically for them. Also teach them not to use their corporate email when registering for services online. In addition, IT and security managers should apply security procedures that restricts malware from spreading from one machine to the other, by enforcing user group policies and segmented networks within the corporate LAN.”
While awareness certainly has an important role to play, organisations of all sizes also have to invest in security solutions to protect themselves. “You need to ensure that every entry and exit point for your organisation is secure. This includes protection at the endpoint and on the server side. It is also important to monitor encryption attacks through components such as a system watcher, which will enable you to revert back to the place where the station is not compromised.”
But what about the general consumer?
The proliferation of mobile devices on the African continent and an increase in Android malware means that individuals can also be at risk. Firstly, mobile users should make sure their device is updated at all times and they are using the latest version of their operating system on their phone. Secondly, they should be aware of what types of applications they are downloading and ensure they only download apps from credible sources such as their relevant app store and not from links that are being distributed via email or on social networks.
“I would recommend watching what you download. As mentioned earlier, big events often rely on apps to disseminate information to visitors, which creates an opportunity for attackers. So, if you are going to download an event-specific app or a trending game like Pokémon GO, make sure you have downloaded the right app from a reputable, valid source and that you are not downloading something that looks similar.”
Nowadays one cannot even rely on reviews to determine authenticity as these apps will often have good reviews, because the hackers know how to buy reviews or get reviews from compromised victims.
Where to from here and beyond?
“I believe that every cycle of an emerging attack trend or cycle of threats takes time to eliminate. We do find that in some regions, cyber security is taken more seriously. It also depends on the industry affected, as we find that the telecommunications, military and government sectors take these breaches far more seriously than for example retail. On a general note, we know that cyber threats are around and that they are going to get more severe, but there are security companies out there that are doing all they can to protect users. Collaboration will be key in fighting the scourge, though. So, for example, when Facebook faced a malware issue, we worked with them to create a plug-in to clean your machine if you were infected. Our best arsenal in the fight against cyber attacks will be collaboration, constant research and continuously retracing the attackers to make sure fewer people will fall victim to these attacks.” says Naor.
CES: Most useless gadgets of all
Choosing the best of show is a popular pastime, but the worst gadgets of CES also deserve their moment of infamy, writes ARTHUR GOLDSTUCK.
It’s fairly easy to choose the best new gadgets launched at the Consumer Electronics Show (CES) in Las Vegas last week. Most lists – and there are many – highlight the LG roll-up TV, the Samsung modular TV, the Royole foldable phone, the impossible burger, and the walking car.
But what about the voice assisted bed, the smart baby dining table, the self-driving suitcase and the robot that does nothing? In their current renditions, they sum up what is not only bad about technology, but how technology for its own sake quickly leads us down the rabbit hole of waste and futility.
The following pick of the worst of CES may well be a thinly veneered attempt at mockery, but it is also intended as a caution against getting caught up in hype and justification of pointless technology.
1. DUX voice-assisted bed
The single most useless product launched at CES this year must surely be a bed with Alexa voice control built in. No, not to control the bed itself, but to manage the smart home features with which Alexa and other smart speakers are associated. Or that any smartphone with Siri or Google Assistant could handle. Swedish luxury bedmaker DUX thinks it’s a good idea to manage smart lights, TV, security and air conditioning through the bed itself. Just don’t say Alexa’s “wake word” in your sleep.
2. Smart Baby Dining Table
Ironically, the runner-up comes from a brand that also makes smart beds: China’s 37 Degree Smart Home. Self-described as “the world’s first smart furniture brand that is transforming technology into furniture”, it outdid itself with a Smart Baby Dining Table. This isa baby feeding table with a removable dining chair that contains a weight detector and adjustable camera, to make children’s weight and temperature visible to parents via the brand’s app. Score one for hands-off parenting.
Click here to read about smart diapers, self-driving suitcases, laundry folders, and bad robot companions.
CES: Tech means no more “lost in translation”
Talking to strangers in foreign countries just got a lot easier with recent advancements in translation technology. Last week, major companies and small startups alike showed the CES technology expo in Las Vegas how well their translation worked at live translation.
Most existing translation apps, like Bixby and Siri Translate, are still in their infancy with live speech translation, which brings about the need for dedicated solutions like these technologies:
Babel’s AIcorrect pocket translator
The AIcorrect Translator, developed by Beijing-based Babel Technology, attracted attention as the linguistic king of the show. As an advanced application of AI technology in consumer technology, the pocket translator deals with problems in cross-linguistic communication.
It supports real-time mutual translation in multiple situations between Chinese/English and 30 other languages, including Japanese, Korean, Thai, French, Russian and Spanish. A significant differentiator is that major languages like English being further divided into accents. The translation quality reaches as high as 96%.
It has a touch screen, where transcription and audio translation are shown at the same time. Lei Guan, CEO of Babel Technology, said: “As a Chinese pathfinder in the field of AI, we designed the device in hoping that hundreds of millions of people can have access to it and carry out cross-linguistic communication all barrier-free.”
Click here to read about the Pilot, Travis, Pocketalk, Google and Zoi translators.