Experts are warning that working from home is making businesses more open to cyberattacks, especially as hackers use new tools like artificial intelligence (AI) to trick people. Since many employees now work remotely, scammers are taking advantage of weaker human awareness, not just flaws in technology.
Joe Jones, who runs a cybersecurity company called Pistachio, says that modern scams are no longer just about breaking into systems. Instead, they rely on fooling people. He explained how AI can now create fake voices that sound just like someone’s boss or colleague. This makes it easier for criminals to lie their way into a company’s systems.
A recent attack on the retailer Marks & Spencer (M&S) shows how dangerous this has become. Reports say cybercriminals pretended to be trusted staff members and convinced IT workers to give them access. This kind of trick is known as social engineering—when attackers focus on manipulating people, not just software.
In fact, a recent study found that almost all data breaches last year happened because of human mistakes, not system failures.
Jones believes spending money on cybersecurity tools can help, but it’s not the full answer. He said that if workers aren’t taught how to spot scams, even the best technology can’t protect a company. He compared it to buying expensive security systems for your home but forgetting to lock the door.
The M&S hack also caused problems for other well-known shops, including Co-op and Harrods. Stores had to pause online orders, and some shelves went empty, showing how these attacks can impact daily business operations.
Jude McCorry, who leads a cybersecurity group in Scotland, said this kind of attack could lead to more scam messages targeting customers. She believes companies should run regular training for employees just like they do fire drills. In her view, learning how to stay safe online should be required in both businesses and government offices.
McCorry also advised customers to update their passwords, use different passwords for each website, and turn on two-factor login wherever possible.
As we rely more and more on technology for banking, shopping, and daily services, experts say this should be a serious reminder of how fragile online systems can be when people aren’t prepared.
The FBI has warned the public, private sector, and the world about the “victimization of US-based businesses”, as cyberattacks involving remote IT workers from North Korea are on the rise. It has noticed North Korean IT workers gaining illegal access to systems to steal confidential data and launch other cyber-crime operations.
In an FBI announcement reported by Forbes, it was disclosed that “victims have seen proprietary data and code held to ransom,” and “the copying of corporate code repositories to attacker user profiles and personal cloud accounts.” Additionally, the attackers have also “attempted harvesting of company credentials and session cookies for further compromise opportunities.”
Law enforcement and intelligence agencies like the FBI and NSA (National Security Agency) have advised the principle of least privilege, to “only allow designated administrator accounts to be used for administrative purposes.” The aim is to limit the administrative rights available to Mac and Windows users to ensure security.
The principle of least privilege gives admin account access to only selected people, and nobody else. The method ensures company employees only have access to particular resources needed to get the job done, not admin rights. For instance, the user account completes day-to-day needs, whereas for something critical, like software installation, the systems will ask for admin credentials.
Wikipedia is one great example of using this technique, it has user accounts for making backups that don’t need to install software and only have rights for running backups and related applications.
The FBI suggests businesses disable local administrator accounts and restrict privileges for installing remote desktop apps, keeping an eye out for any unusual network traffic. It has warned organizations to remember that “North Korean IT workers often have multiple logins into one account in a short period of time,” coming from various IP addresses linked with different countries.
The agency has also advised HRs, development teams, and hiring managers to focus “on changes in address or payment platforms during the onboarding process.”
Today's changing cyber threat landscape presents a tremendous challenge to enterprises worldwide. With the rise of malevolent AI-powered threats and state-sponsored enterprises, the security sector is at a crossroads.
Threat complexity increases, creating ubiquitous and multifaceted dangers, including sophisticated cyberattacks and internal weaknesses. This environment necessitates novel solutions, encouraging a move from old security paradigms to a more integrated, data-driven approach.
Cyber threats are no longer limited to lone hackers in dark basements. Sophisticated state-sponsored attacks, ransomware gangs, and organized cybercrime syndicates pose substantial risks. The evolving threat landscape demands agility and adaptability from cybersecurity professionals.
The Covid-19 pandemic accelerated the adoption of remote work. While it offers flexibility, it also introduces security challenges. Securing remote endpoints, ensuring secure access, and protecting sensitive data outside the corporate network are top priorities.
Ransomware attacks have surged, with costs doubling in 2021. These attacks not only encrypt critical data but also threaten to leak it publicly. Cybersecurity teams must focus on prevention, detection, and incident response to combat this menace.
Organizations operate across multiple locations, including remote branches. Each branch introduces potential vulnerabilities. Additionally, the proliferation of Internet of Things (IoT) devices adds complexity. Cybersecurity operations must extend their reach to secure these distributed environments effectively.
Traditional security paradigms are shifting. Siloed approaches are giving way to integrated solutions that leverage data analytics, machine learning, and threat intelligence. Security operations centers (SOCs) now rely on real-time data to detect anomalies and respond swiftly.
Cybersecurity is no longer just about firewalls and antivirus software. A holistic approach involves risk assessment, vulnerability management, identity and access management, and continuous monitoring. Collaboration across IT, development, and business units is essential.
Innovations like artificial intelligence (AI) and quantum computing are game-changers. AI enhances threat detection, automates routine tasks, and augments human decision-making. Quantum computing promises to revolutionize encryption and decryption methods.
The COVID-19 pandemic has caused a seismic shift in the way we work, with remote work becoming the norm for many organizations. While this has brought numerous benefits, it has also presented new security challenges. In response, companies have turned to remote browser isolation as a solution.
According to the "Innovation Insight for Remote Browser Isolation" report by Menlo Security, remote browser isolation is a rapidly evolving technology that is gaining popularity due to its ability to provide a secure browsing experience. In this blog, we will explore some of the key findings of this report and examine the growing importance of remote browser isolation in today's business landscape.
Amit Jain, who holds the position of Senior Director of Product Management at Zscaler, a cloud-based security company, suggests that due to the increasing number of remote employees utilizing cloud services, browser isolation has become essential in safeguarding both corporate cloud services and the employee's device.
He says, "For modern enterprises, the Internet is now the corporate network. This shift has enabled workers to work from anywhere while being able to access the information they need for their jobs through cloud-based apps and private apps via the Web, while this has provided maximum flexibility to workers, it has also significantly expanded the attack surface and has the potential to expose data."
Mr. Jain from Zscaler said "The technology should be fully integrated into the zero trust platform providing threat protection for all Web activity and preventing data loss from sanctioned SaaS and corporate private apps. Moreover, HTML smuggling [and other] attacks can be better thwarted by an architecture which involves a tighter combination of browser isolation and sandbox technologies."
As cloud usage has increased, browser isolation has become even more important. Cloud services are often accessed through web browsers, and if a user's device is compromised, the sensitive data stored in the cloud is also at risk. However, using browser isolation significantly reduces the risk of a data breach.
Mark Guntrip, senior director at Menlo Security, said "It's not the fact of what we do — it's the fact that we do it without interfering with that digital experience of the end user." So they can interact with whatever they want. They can click on whatever they want, but we hold anything that's active away from them"