Shihas: Most companies and organizations have begun digitalization and increased use of IoT for day-to-day IT operations, manufacturing, testing, working modes, performance evaluations etc. Due to this, disruption in digitalization, cybersecurity threats pose big challenges for businesses.
Here are some key cyber threat challenges expected in the coming months and maybe even years:
AI (Artificial Intelligence) based technology is used for most social engineering attacks (simulating human chat) and for DDoS attacks. By the time, more accurate algorithms will get better at mimicking normal users on a network to foil detection systems looking for odd behaviors.
Disruption in Home automation using various IoT Technologies could be common from 2021, in IoT applications such as remote fire alarm detection, in-home patient monitoring systems, CCTV video surveillance etc, that are connected to the internet.
It can also create fake alarms, interrupt internet availability by router vulnerabilities, maliciously control home appliances to cause harm to the family or homeowner.
Due to Covid, most businesses are moving to the cloud. There can be an increase in cloud breaches due to poor security practices in cloud-based configurations.
IoT devices may be more protected than, say, traditional IT assets from ransomware attacks. On the other hand as IoT has moved into Industrial IoT which deals with OT systems, OT systems can be far more dangerous than those caused by traditional ransomware.
Shihas: There is a need for people and organizations to increase their knowledge about cybersecurity and share the same with others too. If every organization conducts a standard awareness program for all employees, it will go a long way in educating the masses.
With the increased use of digital gadgets, everyone is responsible for protecting their own assets, personal information, family, job-related assets. Besides, each organization is responsible for delivering cybersecurity awareness particularly related to digital gadgets when using them for either social media, study, remote work or meetings. It can be made through its dedicated security officers / IT, hiring a 3rd part security awareness providing company and can be given frequently in a year and create strict policies to follow.
Shihas: First, be aware of the remote working policies of the company, make sure your internet connections are stable, make sure you are not shared or given full control to anyone to control your computer.
Make sure you are not opening your company data or personnel information and share it on a desk, lock the computer access, do not download unless from a safe sender.
Some simple pointers to stay safe are: