Connect with us

Featured

Security gaps mean companies get repeat attacks

Published

on

Businesses that suffer ransomware attacks don’t always learn from the experience, and are often vulnerable to repeat exploits. This is a central finding by global network and endpoint security leader Sophos, from a survey called The State of Endpoint Security Today.

The survey polled more than 2,700 IT decision makers from mid-sized businesses in 10 countries worldwide, including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India, and South Africa. The survey concluded that, despite the high profile headlines of 2017, businesses are still not prepared to face today’s fast-evolving threats.

Ransomware continues to be a major issue across the globe with 54 percent of organizations surveyed hit in the last year and a further 31 percent expecting to be victims of an attack in the future. On average, respondents impacted by ransomware were struck twice.

“Ransomware is not a lightning strike – it can happen again and again to the same organization. We’re aware of cybercriminals unleashing four different ransomware families in half-hour increments to ensure at least one evades security and completes the attack,” said Dan Schiappa, senior vice president and general manager of products at Sophos. “If IT managers are unable to thoroughly clean ransomware and other threats from their systems after attacks, they could be vulnerable to reinfection. No one can afford to be complacent. Cybercriminals are deploying multiple attack methods to succeed, whether using a mix of ransomware in a single campaign, taking advantage of a remote access opportunity, infecting a server, or disabling security software.”

This relentless attack methodology combined with the growth in Ransomware-as-a-Service, the anticipation of more complex threats, and the resurgence of worms like WannaCry and NotPetya puts businesses in serious need of a security makeover, according to Sophos. In fact, more than 77 percent of those impacted by ransomware were running up to date endpoint protection, confirming that traditional endpoint security is no longer enough to protect against today’s ransomware attacks.

“Organizations of all sizes are starting 2018 with inadequate protection against ransomware, despite last year’s international headlines,” said Schiappa. “Given the ingenuity, frequency, and financial impact of attacks, all businesses should reevaluate their security to include predictive security technology that has the capabilities needed to combat ransomware and other costly cyber threats.”

According to those impacted by ransomware last year, the median total cost of a ransomware attack was $133,000. This extends beyond any ransom demanded and includes downtime, manpower, device cost, network cost, and lost opportunities. Five percent of those surveyed reported a $1.3 million to $6.6 million as total cost.

Two-Thirds of IT Admins Surveyed Don’t Understand Anti-Exploit Technology

IT professionals also need to be aware of how exploits are used to gain access to a company’s system for data breaches, distributed-denial-of-service attacks, and cryptomining. Unfortunately, Sophos’ survey revealed considerable misunderstanding around technologies to stop exploits with 69 percent unable to correctly identify the definition of anti-exploit software. With this confusion, it’s not surprising that 54 percent do not have anti-exploit technology in place at all. This also suggests that a significant proportion of organizations have a misplaced belief that they are protected from this common attack technique yet are actually at significant risk.

“The lack of awareness and lack of protection against exploits is alarming. We’ve seen a resurgence in cybercriminals looking for vulnerabilities to actively use in countless attack campaigns. Five or six years ago we saw one per year, and last year as many as five new Office exploits have been used for cybercriminal activity, according to SophosLabs,” said Schiappa. “When cybercriminals are deliberately seeking out both known and zero-day vulnerabilities and an organization has a deficit in defenses, it adds up to a bad security situation.”

Intrusions from exploits have been happening for years but are still a prominent threat and often go undetected for months, if not years. Once inside a system, cybercriminals use complex malware that can hide in memory or camouflage itself. In many cases, businesses do not know they’ve been breached until someone finds a large cache of stolen data on the Dark Web.

“It’s time to disrupt these intrusions,” said Schiappa. “Since traditional endpoint technologies are often unable to keep up with advanced exploit attacks used to compromise a system, Sophos has added predictive, deep learning capabilities to the newest version of its next-generation endpoint protection product, Sophos Intercept X.”

Although 60 percent of respondents admitted their endpoint defenses are not enough to block the attacks seen last year, only 25 percent have predictive threat technologies, such as machine or deep learning, leaving 75 percent vulnerable to repeated ransomware attacks, exploits, and evolving advanced threats. Sixty percent plan to implement predictive threat technology within a year, yet confusion about it persists. Of those surveyed, 56 percent admitted that they do not have a full understanding of the differences between machine learning and deep learning.

“Given the speed at which cyber threats have evolved it is not surprising that many IT managers are unable to stay ahead of the next-generation technology required for security. Yet this knowledge gap could be placing operations at risk. Organizations need effective anti-ransomware, anti-exploit, and deep learning technology to stay secure in 2018 and beyond,” said Schiappa.

The State of Endpoint Security Today survey was conducted by Vanson Bourne, an independent specialist in market research. This survey interviewed 2,700 IT decision makers in 10 countries and across five continents, including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India and South Africa. All respondents were from organizations of between 100 and 5,000 users.

Featured

AppDate: uKheshe bring banking to the masses

In his apps roundup, SEAN BACHER highlights uKheshe, FNB’s banking app with its will feature, Split Payments, Momentum Safety Alert and Fleetonomy.

Published

on

uKheshe micro transaction platform

Financial inclusion took another step forward as local start-up, uKheshe, South Africa’s cheapest and most convenient QR cash card and micro transaction platform, won the 2019 Global Fintech Hackcelerator @ Southern Africa competition. 

“The issue of financial inclusion is a global one and the more we can do to uplift the unbanked and under banked, the healthier their respective economies will become,” says Clayton Hayward, co-founder, uKheshe.

While 1.2 billion people have opened a financial account since 2011, there is still an estimated 1.7 billion adults worldwide (or 31% of adults) who don’t have a basic transaction account.  Globally, two-thirds of adults without an account cite a lack of money as a key reason, which implies that financial services aren’t yet affordable or designed to fit low-income users.

To find out more about uKheshe click here

FNB’s banking app with will feature

First National Bank now lets its customers draw up their own wills via the FNB Online Banking platform at no cost. To date, the bank has seen a significant increase in the number of clients who drafted their own wills online, with over 52 000 clients already accessing the functionality.

Approximately 80% of South Africans don’t have a valid will in place; and many people believe that it’s a need only when they get older, or later in life. 

“Whilst the digital process is simple and easy to use, the solution also helps with a dedicated client support centre should clients need further assistance or advice regarding the drafting of their wills,” says Johan Strydom, Growth Head, FNB Wealth and Investments. “The solution aims to simplify the process and allows customers to easily draft a will online anytime and at any place, at no cost. In addition, FNB will keep your original will in safe custody at no extra cost.”

Platform: Android and iOS

Expect to pay: A free download

Stockists: Available the FNB app which can be be downloaded here.

Split Payments

PayFast has launched Split Payments, a South African-first that instantly splits a portion of an online payment with a third party. The service is designed to facilitate fast, safe payments for platform-based businesses, including online marketplaces.

For those who run a marketplace that brings together multiple sellers or merchants looking for new sales channels, Split Payments addresses payment headaches with a simple API integration.

Consumers are used to engaging with large global transactional platforms such as AirBnB, Uber, and Amazon. The benefits and extended reach of these types of platforms are catching on locally, and organisations like estate agency groups and even community marketplaces are setting up digital trading platforms.

The app allows businesses to instantly split out commission, membership or listing fees, when a payment is made via one of its supported payment methods.

For each online payment received  the business can determine what the split is, either a fixed amount, a percentage, or a combination of both. Custom recurring payment integration, such as subscriptions payments, can also be split automatically.

Platform: iOS and Android

Expect to pay: A free download

Stockists: Download Split Payments here

Read more about Momentum’s new Safety Alert app and Fleetonomy.

Previous Page1 of 2

Continue Reading

Featured

Why 4G is still a thing

Published

on

Even with the 5G era already upon us, investment in 4G/LTE networks is still vitally important for operators in sub-Saharan Africa and must remain a core focus of network construction for the immediate future. This is according to David Chen, Vice-President, Huawei Southern Africa. 

“Currently, the mobile broadband penetration rate in Africa is only 47%, while 4G penetration rate is merely 10%,” Chen said.

“Insufficient coverage causes LTE users to fall back to the 2G or 3G networks, resulting in significant decline in user experience. It also leads to congestion on the 2G and 3G networks and makes it difficult to release spectrum used by 2G and 3G.”

Chen said that LTE and 5G complement each other and are evolving in parallel. In the next few years, 5G will mainly be used in more industrial communications.

LTE will remain the primary choice for global mobile communications through 2025. It will form the basic layer of national networks, especially when it comes to the mobile broadband access.

“It will take a long time for 5G to provide nationwide continuous coverage. Before that, enhanced LTE networks can guarantee optimal user experience for 5G users, including services such as VR, AR, and cloud gaming,” said Chen.

He said that it is important for operators to invest in 4G to secure future growth, as it is estimated that there will be an additional 80 million LTE users in sub-Saharan Africa by 2025.

Driven by this growth, LTE traffic in sub-Saharan Africa will increase by a factor of 8.8. By 2025, about 80% of all data traffic in the region will be over an LTE network.

LTE will also be the main source of future revenue for operators.

“According to GSMA Intelligence, 2G and 3G users in sub-Saharan Africa will gradually migrate to 4G,” said Chen. “By 2025, the proportion of 2G users will drop from 46% to 12%.”

Part of the reason for the migration to 4G is because the ecosystem is mature.

“The price of feature phones supporting VoLTE in the sub-Saharan Africa market has been as low as $25,” Chen said.

Since 5G equipment is already available, there is an opportunity for operators to build out their 4G networks while ensuring that they can evolve to 5G in future.

Chen offered the following tips to operators to ensure they are ready for 5G:

  • All future equipment installations should be 5G ready, allowing easy upgrades to 5G through software updates.
  • Software should support multi-standard spectrum sharing to improve spectrum efficiency, and to allow the smooth migration of 2G and 3G users.
  • Networks must support 4G and 5G coordination, in terms of spectrum, operation and maintenance. This will ensure that users have a consistent experience as we enter the 5G era.
  • The value of existing ICT infrastructure, such as base station sites, must be maximised to avoid overlapping services and wasted resources. This would mean boosting the capacity and coverage of every station for optimum efficiency.
  • Carriers should explore the business case for all possible 5G innovations when building 4G networks, and not just embrace 5G for its own sake. This will mean building business models around IoT, video, live broadcast, augmented reality, and virtual reality.
  • It is important that operators build partnerships with providers that can support the ongoing spectrum evolution with fast site upgrades and large-capacity solutions. The idea is to maximise the value of 4G networks, and smoothly evolve to 5G without unnecessary infrastructure investment.

Continue Reading

Trending

Copyright © 2019 World Wide Worx