Working from home is very normal
Covid also appears to be the cause of some important developments in this subject. The pandemic has disrupted the way workers and organizations work. Just think of the greatly increased percentage of homeworkers.
Nearly 60% worked at home wholly or partly in 2020. That was a third before the corona crisis. By working from home you increase the presence in the cloud and therefore IT Security in your organization becomes vulnerable if you rely on classic security.
The cloud as storage for everything
What applies to working from home also applies to private life and in all other situations. Using the cloud is the most natural thing in the world. The number of cloud application users is expected to increase by 2021% in 18. The amount of data grows with it, and that makes you more vulnerable.
All your devices online
One growth factor takes care of the other. This certainly applies to cloud applications on other devices. We used to only connect to the computer, then came tablet and mobile. In 2021 we will be talking about IoT, the Internet of Things.
Photo cameras, smartwatches, refrigerators and the thermostat in your home: they are online and therefore accessible to malicious parties. This year we are now talking about more than 10 billion devices with internet access.
The digital transformation is only accelerating
Research firm Gartner estimates that more than $3,3 trillion will be invested in IT in the US alone this year. A large part of this amount goes to new technology for digital transformation and IT Security. In practice, this often means moving to the cloud.
The above trends increase the chance of problems with your IT security. But there's more. On top of that, Kaseya sees four threats. And those threats are only getting bigger.
1. Ransomware Attacks
The research also shows that ransomware attacks are unfortunately no longer an exception. In a ransomware attack, valuable data or files are stolen or critical business units are shut down. The hacker then gives you an ultimatum. Usually a large amount of money is demanded.
If you don't pay, your devices, systems, networks and files will remain blocked or out of reach. About 10 percent of all attacks this year involve ransomware.
2021 also sees an 11% increase in the number of phishing attacks. If you click on a link in a phishing e-mail, without IT Security there is an access pass for malicious parties to take over your account and gain access to sensitive data.
3. The danger from within
Kaseya cites a report from Verizon showing that about 20% of all incidents have an internal cause. Carelessness, theft by data or taking personal data without permission are examples of this.
4. An attack on your IT Security without evidence
Hackers are increasingly using intelligent methods for an attack and the so-called Fileless attacks are on the rise. A big advantage for hackers is that it leaves almost no traces and only the most advanced tools detect these types of attacks. By sending an email you will be referred to a rogue site. .
When you arrive there, that site executes commands and uses the systems present on your network, such as PowerShell. Because the use of these tools is common, a fileless attack is not easily noticed.
6 tips for improving your IT Security
Don't be overtaken by hackers, spam and ransomware. We are happy to give you these tips to keep them behind you.
- Keep your It Security in order with the latest updates and patches. Schedule them, set up scripts for what needs to be done or have it performed by the IT specialists at Aumatics.
- If something goes wrong, you limit damage if there is an up-to-date backup. SaaS (software as a service) helps you with this. This way you don't have to start from scratch with the installation and set-up of software.
- Make sure your anti-malware and antivirus programs work with Endpoint detection and response. Regardless of network, device or location, you stay within range of the radar.
- Create a standard for security for every device you manage, such as a firewall, DNS filtering, malware protection, multifactor authentication (MFA) and encryption.
- Last but not least: train your employees and other stakeholders in recognizing and preventing attacks. Set a regularity for this and make it a habit. Aumatics is happy to help you with this.
Our offer for advice and action also applies to the technical side of the story. Dozens of customers rely on Aumatics' cyber security solutions. Kaseya solutions are regularly part of monitoring and management.