Featured 2022: An evolving cybersecurity landscape

Published on March 15th, 2022 📆 | 3202 Views ⚑

0

SoftwareONE : Cyber Security Update February 2022


iSpeech

The war in Ukraine has placed the spotlight firmly on cyber security. As always, SoftwareONE's monthly Cybersecurity Update provides information on the most recent threats, the latest breaches and how to react to them in order to stay on top of malware and ransomware threats. In addition, we provide security advice on how to prepare for potential cyber threats as a result of the conflict.


Latest Security Breaches

Toyota suspends the production at 14 plants following a possible cyber-attack. Toyota estimates that the shutdown will affect the production of 13,000 vehicles.

Securitas, a leading security services provider of on-site guarding and risk management based in Sweden, suffered a data breach, which exposed 1.5 million files.

Nvidia was recently victim of a ransomware attack that impacted some of its systems for two days. The chipmaker giant confirms that intruders had access to proprietary information data and employee login data.

Airport ground services and air cargo operator Swissport has been hit with a ransomware attack that caused disruption in operations at Zurich Airport.

Conti ransomware group has internal chats leaked after siding with Russia. Internal strife at Conti sees 60,000 chat messages leaked online.

Critical infrastructure hit again: A cyber-attack on two German logistics firms used by Shell has forced a temporary reroute to alternative supply depots.

Sportswear manufacturer Puma was hit by a data breach following the ransomware attack that hit Kronos in December 2021. Ransomware operators got their hands on data belonging to 6,632 individuals.

Government agencies in Ukraine were targeted in cyber-attacks deploying MicroBackdoor malware.


Cybersecurity Awareness

SonicWall released 2022 Cyber Threat Report: The world saw an alarming 105% surge in ransomware cyberattacks last year.

Traditional methods of mitigating ransomware are less efficacious thanks to the rise in double and triple extortion techniques.

New Chinese hacking tool found: Daxin's capabilities suggest the attackers invested significant effort into developing communication techniques that can blend in unseen with normal network traffic.

FBI warns of "sophisticated" LockBit 2.0 ransomware. LockBit's authors updated it to automatically encrypt devices across Windows domains by abusing Active Directory group policies. This enables it to trigger encryption with a single command.


Cybersecurity Intelligence


Hot Topic of the Month: Shields Up - Review Your Cybersecurity Processes Now

When conflicts occur, part of the standard procedure is to shut down communication and information channels. The risk of cyber-attack is high for everyone right now. For companies and organizations based in countries that express their solidarity with and support for Ukraine, governments and their cybersecurity agencies are actively warning of a rising number of cyberattacks. We do not know the form of attacks that will emerge, or those that may emerge successfully, but according to Forbes you must have your eyes open for:

  • Advanced Persistent Threats (APTs)
  • Malware
  • Ransomware
  • DDoS
  • Network attacks
  • Zero-Day vulnerabilities
  • Code flaw vulnerabilities
  • Privilege escalation
  • Data anomalies
  • Network anomalies
  • Or - some combination of any of the above.

There is also a risk of an increase in disinformation, fake news and phishing emails attempting to direct recipients to campaigns raising funds for Ukrainian refugees, claiming to have unique news clips or similar. This shows the willingness of cyber criminals to quickly and effectively launch campaigns to scale and monetize their activities.


What your IT team can do to improve your company´s cybersecurity resilience:

  1. Enforce a strong, secure password policy.
  2. Implement two-factor authentication for all external access and for all accounts with administrative privileges. This should also be considered for power users who have broad access to company data.
  3. Update and patch immediately to eliminate the risk of becoming a victim of a previously known vulnerability.
  4. Test backups and disaster recovery systems. Make sure you keep offline backups as well as those in the cloud.
  5. Audit user access rights - reduce risk by restricting access to services, software and data so only those who need access actually have access.
  6. Close ports and stop services that are not in use, leaving an open door that can be easily closed.
  7. Legacy systems based on outdated technology should be segmented and separated from the productive network.
  8. And of course make sure all endpoints, servers, cell phones and the like are protected with an anti-malware product that is updated and fully functional.

We are witnessing unprecedented times. We have never faced the aspects of war that we do today - where attacks can be executed at lightning speed from anywhere in the world. In the face of these threats, cybersecurity is no longer some afterthought. Cybersecurity is basic survival, and it has never been more important. If you're unsure of where to begin, consider the advice of our security experts. When you partner with SoftwareONE, you'll know exactly where your risks are and how to protect your assets. We are right here to support you.


Be Prepared for Ransomware and/or Data Destruction

Ransomware is bad enough, but many have become accustomed to the behavior of demanding a ransom. Those same methodologies and vulnerabilities can also destroy data with the disposal of the decryption key or a simple rewrite. Read SoftwareONE's "Ransomware Rescue Manual" to discover how you can protect your organization now and in the future.

Download your free copy

  • Managed Security, Cybersecurity, Cybersecurity User Awareness, Cyber Threat Bulletin
  • Updates, Trends

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment


Comments


Write a comment

Your name

Your e-Mail address





Send


Author

Bala Sethunathan

Director, Security Practice & CISO


Related Articles

  • 03 March 2022
  • Blog Editorial Team
  • cloud-security, Cybersecurity User Awareness, Cybersecurity
  • Data Security, Security, Cyber Threats, Disaster Recovery, Backup, Cloud Backup

Ukraine Conflict - What IT Leaders Can Do to Ensure Business Continuity

As IT is a critical component of the day to day functioning of all organizations, CIOs and IT leaders will be tasked with ensuring that it is business as 'almost usual', while taking account of some exceptional circumstances.

  • 14 February 2022
  • Bala Sethunathan
  • Cybersecurity User Awareness, cloud-security, Cyber Threat Bulletin, Cybersecurity
  • News, Updates

Cyber Security Update January 2022

While 2021 was filled with great uncertainty, there are still guarantees in the cyber security realm: Threat actors will continue to attack.

Disclaimer

SoftwareONE Holding AG published this content on 14 March 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 14 March 2022 15:33:09 UTC.

Publicnow 2022

All news about SOFTWAREONE HOLDING AG

Sales 2022 9 468 M
10 141 M
10 141 M
Net income 2022 110 M
118 M
118 M
Net cash 2022 441 M
473 M
473 M
P/E ratio 2022 15,6x
Yield 2022 3,21%
Capitalization 1 722 M
1 845 M
1 845 M
EV / Sales 2022 0,14x
EV / Sales 2023 0,12x
Nbr of Employees 8 711
Free-Float -

Chart SOFTWAREONE HOLDING AG

Duration :


Period :

SoftwareONE Holding AG Technical Analysis Chart | MarketScreener

Technical analysis trends SOFTWAREONE HOLDING AG

Short Term Mid-Term Long Term
Trends Bearish Bearish Bearish

Income Statement Evolution

Sell

Buy

Mean consensus OUTPERFORM
Number of Analysts 10
Last Close Price
11,12 CHF
Average target price
16,31 CHF
Spread / Average Target 46,7%

Source link

Tagged with:



Comments are closed.