Attacks on the internet are getting more sophisticated. Every week it seems another large enterprise finds a hacked database or intrusion of some sort, often attributed to state actors.
There are more places than ever where you might be vulnerable. So here are five cybercrime vectors to be aware of:
1. The browser. Yes it's tempting to save money by NOT updating that internal system that only works in an old browser. The longer you do that the more exposed you make yourself. Make it a sound policy to have everyone on the most current patched version of a browser you can get. Same goes for all your software, really.
2. Your own users. Ransomware is a rising tide of easy money for attackers. And it often makes its way into a system through email. Educate workers about attachments and keep those web servers patched.
SEE: Free book--17 tips for protecting Windows computers and Macs from ransomware (TechRepublic)
3. Industrial Control Systems. Legacy supervisory control and data acquisition, or SCADA, networks sometimes have default or even no passwords. They often control essential physical plant systems.
4. Cars. Attacks on vehicle systems are moving from the realm of research into the world. Lock down your ODB II ports, engine control units (ECUs), remote key systems, V2X receivers, USB ports and more. And keep that car software up to date.
5. Internet of Things. Researchers Brian Krebs and Bruce Schneier have recently sounded the alarm on the almost nonexistent security of sensors, security cameras, light bulbs and even DVRs. Like Industrial Control Systems, you may not be aware how open these entryways are into your network.
Now that you know some of the pathways you can be on guard.
For more detail on emerging threats and how to keep yourself safe, read Dan Patterson's article 2017 cybercrime trends: Expect a fresh wave of ransomware and IoT hacks.
- Google kills support for Gmail in these Chrome versions: Check if you're affected
- Rise of the 'accidental' cybersecurity professional
- Report: Spam and cloud attacks rising, 4 steps to protect your business
- Top 10 companies hiring cybersecurity professionals
- Special report: Cybersecurity in an IoT and mobile world (free PDF)