DID YOU KNOW?

Global ransomware damage costs are predicted to reach

$20 billion

by 2021 – which is 57X more than it was in 2015.

– Cybersecurity Ventures

We’re likely to have more than

75 billion

connected devices accessing the internet by 2025, creating insatiable power demands and security vulnerabilities.

– Forbes

Healthcare industry will spend

$65 billion

cumulatively over 5 years, from 2017 to 2021, on cybersecurity products and services.

– Cybersecurity Ventures

99%

of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident.

– Gartner

THE BAD

As the amount of data people generate is surging at an alarming rate. There's a plethora of data – personal, business, and otherwise in a multitude of formats with minimal to no reigns over the direction of growth. A combination of personal best practices and government regulations will be necessary to adequately secure people’s data.

The need to be on top of IT security is more significant now, than ever before.

cyber attack targets

The Importance of Cybersecurity in the “Connected Everything” Age

number of internet of things

The number of Internet of Things (IoT) devices is expected surpass 20.4 billion by 2020. (Source Gartner)

potential targets

Potential targets include smart cities and virtual assistants.

potential threats

Potential threats include hijacking, privacy leaks, and unsecured devices.

adoption of IoT

With increased adoption of IoT come increased vulnerabilities for enterprises.

Highest Mobile
malware infections
Highest Financial
malware attacks
Highest Computer
malware infections
Highest Telnet attacks
(by originating country)
Highest Attacks
by cryptominers
Highest
Cyber-attacks
Worst up-to-date
legislation
for cybersecurity
The highest-scoring countries category wise

Change in Cyber security scores from 2019 to 2020

The lowest-scoring countries category wise
Lowest Mobile
malware infections
Lowest Financial
malware attacks
Lowest Computer malware
infections
Lowest Telnet attacks
(by originating country)
Lowest Attacks by
cryptominers
Lowest
Cyber-attacks
Most up-to-date
legislation
for cybersecurity

As per the study done by https://www.comparitech.com last year not a single country is “top of the class” when it comes to cybersecurity.

Every country could make significant changes to improve their current status.

country cybersecurity

THE UGLY

data security breaches

Travelex quarantines website, internal systems after New Year’s Eve cyber-attack

The foreign exchange firm TRAVELEX was attacked by a cybercriminal group behind the Sodinokibi ransomware, also known as REvil, on New Year’s Eve 2019.

Finastra brings servers back online after ransomware attack

The Finastra IT security and risk teams actively detected, that a bad-actor was attempting to introduce malware into their network

Greece’s major banks cancel 15,000 cards after travel website breach

Greece’s four main banks – Alpha Bank, Piraeus Bank, Eurobank and the National Bank of Greece – were forced to cancel 15,000 credit and debit cards after payment card data used by some of their customers on a Greek tourist services portal was hacked in January.

India’s popular BHIM payments platform reportedly leaks data of an alarming 7M users

A report from cybersecurity company VPN Mentor suggests that this 409 GB database was stored in a misconfigured AWS S3 bucket, making all data publicly accessible.

Maryland elderly healthcare provider hit by data breach impacting 47K individuals

Lorien Health Services, a Maryland-based operator of nursing and assisted living facilities for elderly patients, has disclosed a data breach linked to the NetWalker ransomware gang

2020 And Beyond: The fog thickens

In June 2020, there were 92 security incidents and at least 7,021,195,399 breached records.
On 20th May 2020 – in a single day, there were 49,127,689 cyber-attacks on the threat map which equates to 568 cyber-attacks occurring every second!

Top 6 Common Types of Cyber-Attacks in 2020

SQL Injection
Attack
Phishing and Spear
Phishing Attacks
Malware
Botnets
Cross-Site
Scripting Attacks
Denial-of-Service
and Distributed
Denial-of-Service Attacks

THE GOOD

Cyber threats
have evolved, and
so have we.

Cybersecurity best practices

cybersecurity best practices
Key cyber
security
considerations
Aligning business goals
with security needs
Cloud
transformation
Automating the
security function
Digital trust and
customer authentication

Staying on top of these cybersecurity practices could be the difference between a secure company and one that a hacker might target.

The Time to Re-think
Cybersecurity is NOW!
hacker

CLOUD4C - THE PARTNER FOR YOUR JOURNEY TO COMPLETE SECURITY

Our team of cybersecurity experts offer an active investigative and mitigative approach to help keep your business secure.

Sources

  • https://www.forbes.com
  • https://www.horangi.com
  • https://thenextweb.com
  • https://www.appknox.com
  • https://cybersecurityventures.com