Data breaches, hacking, and skimming -- all of it poses a threat to consumers and businesses during 2019. Be aware of these top 5 threats that are on the rise this year and learn how to secure your company.
“Today's hackers are very deft at outsmarting security measures,” said Michael Bruemmer, Experian Vice President of Data Breach Resolution, adding that, "cybercriminals always seem to stay a step ahead of new security gates." According to the Identity Theft Resource Center (ITRC), data breaches increased sharply in 2018 with 1,027 breaches reported and 57,667,911 records compromised.
Experian’s 5 top threats for 2019 are really a bit of a shock. Biometric hacking, skimming major financial institutions, attacks on wireless carriers, breaches on cloud services are just a few listed. Take a look at the top five and learn how to protect yourself and your organization.
1) Biometric hacking and detecting flaws in touch ID sensors, passcodes, and facial recognition are a new wave of attacks. Although biometric data is still the most secure method of authentication, it can be stolen or altered. So, don’t get too comfortable with the new features released on cell phones and laptops. Lock down your business and personal accounts with Two-Factor Authentication (2FA) whenever possible.
2) Clever skimming techniques on major financial institution's accomplished with hidden devices to steal credit card information, and invade bank network computers with undetectable malware are on the rise. Protect your accounts online with 2FA, use a password manager even on your cell phone and always, verify e-mails from your banking institution by logging directly in to your account online to view messages or information.
3) Attacks on significant wireless carriers have simultaneous effects on iPhones and Androids, stealing personal information from millions of phones and possibly disabling wireless communications. This type of target is virtually impossible to prevent from a consumer level however, how you use your devices could be a saving grace. Do not keep critical business or sensitive personal information on your cell phone. These files can be compromised if your carrier is attacked.
4) Cloud provider vulnerabilities. A breach in the security operations of your cloud vendor could jeopardize your sensitive information too. Not all cloud services have proper security in place. Be sure to ask questions when implementing a cloud solution. Is your data encrypted when it is not being used? Is there strong physical security at the datacenter where the cloud is hosted? Is there a firewall solution? Are there intrusion detection systems with event logs and someone monitoring them? Be aware of the risks and how to protect your company data.
5) The gaming community will be faced with cybercriminals posing as gamers for access to its computers and the personal data of trusting players. According to the ITRC, significant breaches from 2005-2017 rose from about 200 per year to more than 1,300. Billions of data pieces have been exposed, allowing cybercriminals to monetize stolen data, leading to an increased risk of identity theft. While this doesn’t seem like an issue that would impact your office, many workers use their laptops for personal gaming when they are away from the office. Put the proper security in place to avoid a breach by implementing an Acceptable Use Policy so everyone knows what is expected.
Where do I start? Create and implement a Bring Your Own Device (BYOD) policy and an Acceptable Use Policy to set the standards for your staff as well as reduce the risks for an attack. In addition, implement 2FA wherever possible to lock down your company applications and information.
Need help? Give us a call today.We will conduct a full review of your network and security to ensure you have all the latest updates and preventative measures in place.