2018 has been a year where malware, ransomware and data breaches have barely been out of the headlines, but what’s in store for cyber-security in 2019?

As long as there’s a digital landscape, hackers will continue to launch an array of attacks that take in numerous different techniques. And, most importantly, they will continue to evolve their methods to avoid detection and cause more damage to networks and the PCs on them. With this in mind, it’s perhaps the best time to take a look at the security trends which will be most important for your organizations defenses next year.

To help you get prepared for next year, we’re going take a look at some of the major security trends to look out for in 2019.

Backups will continue to be Crucial

With ransomware still remaining a prevalent and major threat to secure and essential data, backing up your data regularly and rigorously will be a vital task for all organizations. Backups may seem a costly affair in terms of budget and time, but it only takes one employee to fall victim to a ransomware scam for your entire network’s data to be compromised. And with new ransomware scams such as Zenis deleting backups, it’s essential that offsite and non-network backups are also held.

Coinminer Malware Remains a Threat

Cryptocurrency is still a lucrative business and mining for cryptocurrency continues to generate large amounts of cash. However, whilst this is perfectly legal and above board, the use of coinminer malware is far from legal or ethical. Due to the amount of processing power involved in mining for cryptocurrency, hackers are using malware to enslave PCs remotely and using their processor power to mine for cryptocurrencies. This form of malware has become harder to detect and more sophisticated throughout 2018, so expect it to evolve further in 2019.

The Hacking of IoT Devices will Increase

Close to 27 billion IoT devices will be connected in 2019 – an increase of nearly 3 billion compared to 2018 – so you can bet your bottom dollar that the number of attacks in this arena will increase accordingly. Unfortunately, many owners of IoT devices are still neglecting to change the default password to access these devices and this is giving hackers free rein to take control of them. Not only does the default password debacle remain an issue, but hackers are now designing malware to take advantage of vulnerabilities in IoT devices.

Security Training

Due to the threats already presented, security training will become paramount in 2019. As hackers evolve their methods of attack at a rapid pace, keeping your organization’s staff aware of these threats is one of the best forms of defense you can employ. Awareness training hammers home the basics of good security practices and you’ll find that these can also be used to combat the new threats which will no doubt go head to head with your security defenses.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


 

There’s a good chance that the benefits of the Internet of Things (IoT) could make a huge difference to your organization, but how do you get started?

With around 30 billion IoT connected devices due to be in use by 2020, the IoT is clearly here to stay and the benefits in business are immense. Improved communication, enhanced automation and increased productivity are just a few of the benefits on offer. And, if you’re in business, then you’ll know that these benefits alone are crucial.

However, the IoT world is still relatively new and many organizations are apprehensive when it comes to introducing it to the workplace. Rather than leaving you adrift as your competitors surge forward, we’ve put together some tips on how to introduce the IoT into your organization.

Meet with IT Professionals and Create a Plan

The IoT may seem fairly straightforward in terms of how all the various devices connect, but the truth is that the IoT can be highly complex. Therefore, you need to speak to IT professionals. With their years of expertise in IT innovation, they will be able to recommend the correct technology and how you can begin to implement this into your existing IT network. Otherwise, you will never experience the full range of benefits that IoT can provide.

Understand Why You Need the IoT

If you want to embrace the IoT then you need to understand what it can do for your organization. There are, as previously stated, many benefits on offer from adopting the IoT into your operations, but not all of them will apply to your needs. And that’s why you need to identify the key problems within your business that the IoT can solve. Perhaps it’s increased productivity, perhaps it’s enhanced data processing. Either way, in order to implement the IoT correctly, you have to understand these problems from the very start.

What Can Your Current Setup Provide?

Introducing the IoT doesn’t mean that you have to start from scratch when it comes to your existing IT infrastructure. Many business owners, however, worry that the costs will spiral out of control, but this couldn’t be further from the truth. Sure, there may be the need for certain upgrades to be made to accommodate IoT technology, but plenty of your existing technology will be able to provide a seamless transition. Carrying out a full analysis of your equipment and understanding its capabilities will allow you to identify the areas which need updating.

Establishing Good Staff Training

As with any new form of technology, the IoT will require a certain level of training for your staff. Their existing knowledge of the IoT and the level of interaction they will have with the IoT in your organization will vary, but training is essential. This can be offered either in-house or by external training courses that specialize in training in IoT practices. Once your staff has received the relevant level of IoT training required you’ll find that the integration process is as hassle free as it can be.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The Internet of Things (IoT) has revolutionized the way we do business thanks to the accessibility on offer, but are you getting the best out of it?

More and more organizations are using IoT devices to help improve their business operations and it’s estimated that around 31 billion IoT devices will be in use by 2020. The aim of these IoT devices, in business, is to maximize productivity and help organizations deliver fantastic customer experiences. Understanding how they can achieve these objectives, however, isn’t as simple as just plugging the devices in and letting them get to work.

To help you appreciate which areas of your business they can improve, we’ve put together a list of the best ways to use the IoT in business.

Analytics

Due to the vast range of IoT devices now available, it’s possible for businesses to measure and analyze almost anything you can imagine. Say, for example, you want to understand the usage of forklift trucks in your warehouse. Sure, you could ask people in the warehouse for anecdotal evidence, but this would only be a rough estimate. If, however, you have an IoT sensor which measures movement, you can calculate some seriously precise data. And, with this data, you can then analyze it more closely and determine much more effective solutions for improving your forklift usage.

Understand Your Customers

Many IoT devices allow you to monitor the behavior of your customers and this gives you a significant edge in understanding their preferences. By collecting based on your customers’ usage of your products, you can begin to build a list of insights which detail their exact needs of your customers. This gives you the opportunity to enhance your products and make them much more beneficial to your customers in future. Accordingly, customers are more likely to stay loyal due to the enhanced experience.

Asset Management

Tracking and maintaining assets has always been a difficult task for businesses, but the IoT has opened up new opportunities that promise to make it easier than ever before. Temperature monitoring devices, for example, can be installed into refrigerators and data then transmitted to an online portal. This can provide immediate and instant reference data all in one place so, if you work in a store with numerous refrigerators, you can immediate see how they are performing without having to go and check each individual unit.

Enhance Your Supply Chain

A good supply chain is crucial for good business and the IoT can deliver some amazing benefits for your supply chain. The IoT allows constant updates to be logged regarding your supply chain and this ensures excellent visibility for stock and products. Delays on parts and other stock issues can be identified exceptionally quickly and this means that these problems can be solved and improved just as quickly. With a more efficient supply chain in place, you’ll also be able to deliver a much better customer experience.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The Internet of Things (IoT) has a new security threat and this time it uses peer-to-peer communication to spread, infect and compromise devices.

In January 2018, security researchers working for Bit-defender discovered a new botnet which, although not related, has similarities to the Reaper botnet. Originally infecting just 12 IoT devices, the Hide ‘N Seek botnet had soon amassed over 32,000 IoT devices by the end of the month. With the ability to steal data, take control of the device and run malicious code, Hide ‘N Seek represents a serious threat.

Understanding new and emerging threats to IoT devices is crucial if you want to protect your organization’s network, so it’s time to investigate Hide ‘N Seek a little closer.

Hide ‘N Seek is No Game

A brand of IP camera manufactured in South Korea appears to be the initial infection source for Hide ‘N Seek, but the botnet is actively attacking other IoT devices. Using randomly generated IP addresses, Hide ‘N Seek attempts to connect to any devices listed against these addresses. If the botnet succeeds in connecting then it either uses default login/password combinations to gain access or performs a brute force attack using a dictionary list to crack the login credentials.

With access obtained, Hide ‘N Seek analyses the device to discover any potential vulnerabilities such as the ability to download malware or launch DDoS attacks. The remote botnet hacker also has the option of executing any command they wish on the infected device; this option provides them with the chance to steal any files they wish. The capabilities of Hide ‘N Seek are clearly advanced and innovative, but what’s even cleverer is that it appears to be constantly redesigning itself to minimize detection.

Communication between the infected devices is made possible by the peer-to-peer network at the heart of Hide ‘N Seek. Using peer-to-peer software for hacking is nothing new, but previous methods have always involved modifying existing torrent software. Hide ‘N Seek is taking hacking to a new level by using completely custom built peer-to-peer software which has no central command unit; therefore, closing this network down is virtually impossible.

Combating Hide ‘N Seek

The advanced design of Hide ‘N Seek is proof that it’s the work of highly skilled hackers, but, once again, the vulnerability being exploited is the use of default passwords. Let’s face it, giving a hacker a key to a locked door is the worst form of security you can imagine, but this is exactly what default passwords are. And this is why password security remains the number one priority for any devices within your network, whether they’re connected to the IoT or otherwise.

By changing these default passwords while devices are on isolated networks, your organization can seriously increase the strength of their defenses. Otherwise, you’re leaving your networks at the mercy of malicious botnets such as Hide ‘N Seek. And, believe me, just as Reaper wasn’t the last IoT botnet, neither will Hide ‘N Seek be the final word in hacking in this new IoT landscape.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The Internet of Things (IoT) has many security concerns, but perhaps one of the most pressing worries is that IoT devices can be easily hacked for just a few dollars.

A group of elite hackers have recently demonstrated the ease with which a hardware hack can be unleashed to take control of IoT devices. All they require to carry out the hack is an SD card reader, the ability to solder and a length of wire – all in all, this should come to around $10. And once they’ve taken control of the device they can not only exploit any data on there, but also use it as a stepping stone to get further into the network it’s on.

With the number of IoT devices expected to hit the 20 billion mark by 2020, the risk of attacks on these devices is only going to get greater and greater. And, for a business, where nearly every employee will have access to an IoT device, perhaps it’s time to get acquainted with this low cost and easy to deploy attack.

Hacking on a Budget

The hack in question is a flash memory attack and, as such, targets IoT devices which have a flash memory – in particular a form of memory known as eMMC flash. It’s likely that you’ve never heard of eMMC flash, but it’s built into a wide range of devices such as smart TVs, cell phones, tablets and even refrigerators. Just think about how many of those devices are in your organization and connected to your network – that’s right, it’s pretty scary. What, though, is this $10 hack?

Well, the hackers – who go under the group name of exploitee.rs – have revealed that they can gain read/write access to devices by taking a flash memory card and soldering wires to five specific places:

  1. Data line
  2. Clock line
  3. Command line
  4. Power line
  5. Ground

This access allows the hackers to start stealing data and to issue commands to the device before taking complete control of it. Once the flash memory card in question is put into an SD card reader, it can then be connected to a PC to glean complete copies of that device’s data inventory. And it’s at this point that the hackers are able to identify zero-day vulnerabilities in the device, vulnerabilities which can be applied to that specific device and any other unit of the same product.

With this information to hand, the hackers are then empowered to launch remote attacks against said device and, potentially, use these infiltrated devices to gain access to the networks they’re connected to. And all of this is possible because hardware manufacturers fail to secure flash memory on their devices, they’re only concerned with creating a front line defense with nothing behind it.

Managing IoT Security Concerns

Hardware manufacturers are slightly off the pace as demonstrated by this budget hack, so for the consumer it’s particularly troubling. As ever, the best advice is to install patches and firmware upgrades as soon as possible. However, when a hardware vulnerability is found it means that it has the potential to leave huge numbers of the same devices – if not all of them – at the risk of being hacked. Therefore, identifying the form of flash memory present in devices may become a major buying point for consumers.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More