Security Media Publishing Ltd

Security News Desk Issue 23

Issue link: http://securitymedia.uberflip.com/i/793296

Contents of this Issue

Navigation

Page 11 of 27

Unfortunately this year will go down in history as one which saw hackers flourish as they committed cybercrimes of huge proportions. In the past, hacking was known primarily for fraud and the but in the past few years it has become more sophisticated. Ransomware in hospitals Hospitals and medical facilities are lucrative targets for ransomware. Hackers can take hostage sensitive patient data in exchange for ransom money, which could rack up as much as $40,000. is was the value of 45 bitcoins that attackers earned from hacking into the Union Memorial Hospital in Maryland, USA. Several ransomware cases also caused hospital computer systems to shut down, including those in the Hollywood Presbyterian Medical Center, LA; Methodist Hospital in Henderson, Kentucky; and in Neuss, Germany. e medical staff were locked out of the hospital's computer network, forcing them to perform record-keeping tasks through pen and paper Bangladesh bank heist A whopping $81 million disappeared from the Bank of Bangladesh in the infamous heist which took place in early 2016. e hackers apparently stole the SWIFT (Society for Worldwide Interbank Financial Telecommunication) credentials of the bank's employees to send fraudulent money transfer requests over at the Federal Reserve Bank of New York to bank accounts in the Philippines and Sri Lanka. At best, a succeeding attack at the bank fumbled over a typo error. Otherwise, the total payout could have amounted to $1 billion. COMELEC website hacking e Commission on Elections website was the subject of large-scale hacking in late March 2016, just before the Philippines was scheduled to conduct the May 2016 national elections. Not only was the site defaced, but voters' data got leaked online as well, with the hacking group purportedly launching the attack to pressure the COMELEC to implement security features on the agency's automated vote-counting machines. Yahoo! data breach Yahoo! has been mired in turmoil ever since it announced in September that a 2014 breach put millions of user account data at risk. e internet giant reported again recently that a separate hacking incident in 2013 might have compromised another billion Yahoo! users' accounts. Yahoo! Chief Information Security Officer, Bob Lord, explained that hackers used "forged cookies" – or the coding that gets stored in a user's browser – to gain unauthorised entry to the accounts in question. Yahoo! was quick to assure users that the hack did not involve any credit card and bank account information, but advised account holders to change their passwords immediately. Suiting up your business against cybercrime Cybersecurity always involves a concerted effort among managers, experts, and lower- level employees in the organisation. Here are some level-specific security measures that experts recommend: • Identify all risks related to cyber security such as those involving remote access to client information and fund transfer requests. Look into risks associated with third-party vendors as well. • Establish cybersecurity governance including policies, procedures, and oversight processes. • Be ready to detect unauthorised activities in your network. • Encrypt your data, use antivirus soware, and keep your patch levels up-to-date. • Empower your managers to see how sensitive data flows through your system, and educate them about proper data sharing policies. • Monitor employees' access to corporate data and set parameters for privilege use. • See to it that your current IT infrastructure can support the soware version that you need. • Check any disparity between your organisation's cybersecurity spending and actual implementation or usage of such security solutions. e threat, as well as the danger of cybercrime is as real as it gets. Hackers will continue with their sinister ploy to disrupt businesses and online communities to their own advances. Needless to say, companies should not take this sitting down. By encouraging everyone's involvement, your organisation can minimise the risks brought about by cybercrime. Cybercrimes that pose the greatest threats to your business Increasingly, businesses have suffered the brunt of massive data breaches that mean the disruptive and costly implementation of disaster recovery plans. Aim Corporate Solutions General Manager, Vladimir de Ramos takes a look back at some of the most unforgettable incidents of 2016. 12 News www.SecurityNewsDesk.com Issue sponsor Cybersecurity Comprehensive range of UK designed & manufactured cameras to suit every application! n Now with NEW revolutionary paint technology n Sony HD STARVIS modules in stock n UK sourced, quality components n Rugged build with proven reliability n Supporting British industry by UK manufacture Tel. 0870 903 3601 Email: info@360visiontechnology.com Website: 360visiontechnology.com To discuss which product best fits your application, please contact our UK Sales Office today. A great British company British made ad A4 26/08/2016 14:56 Page 1

Articles in this issue

Links on this page

view archives of Security Media Publishing Ltd - Security News Desk Issue 23