• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Four cyber hygiene pillars in 2021

Allan Tan by Allan Tan
January 11, 2021
Four cyber hygiene pillars in 2021

Four cyber hygiene pillars in 2021

Few would contest that the early months of 2020 saw organisations scrambling to get operations back to some normalcy. According to Statista for example, the number of employees working remotely peaked at 54% between April 24 to May 1 climbing from 25% by September. The 25% for the week of 25 September is still more than double the figures on 25 February which stood at 11%.

Not surprisingly cyber criminals saw an opportunity with the apparent unreadiness of many businesses, especially small and medium enterprises, for the mass shift to remote work. Verizon reported that a 58% increase in breaches in the healthcare industry.

FutureCIO spoke to Kumar Ritesh, CEO and founder at CYFIRMA, for an update on the cybersecurity landscape in Asia in 2021.

What was the biggest cybersecurity challenge for organizations that shifted to remote working this year?

Kumar Ritesh: Hackers have discovered, very quickly, that it is easy as well as lucrative to target employees working from home. Without the protection of the corporate network, remote workers remain vulnerable to social engineering tactics, phishing campaigns, VPN weakness, and porous home networks.

Cyber criminals now have a direct conduit into homes and devices. By capitalizing on people’s fear and anxiety, cybercriminals have been able to profit from scams, vaccine hoaxes, misinformation, and exploiting vulnerabilities.

The biggest challenge for businesses would be to urgently modify systems and processes to address access controls, intrusion detection, data management, and bringing cybersecurity awareness education to employees.

What were some notable shifts in the cybersecurity landscape this year that you did not see coming?

Kumar Ritesh: The cybersecurity landscape this year has been most interesting. Hackers have always targeted vulnerabilities in systems and software to access prized data and assets.

With the pandemic, threat actors have shifted their attack vectors to people and their weak IT configuration in their home environment. Here we refer to how remote workers have been tricked into releasing credentials and other sensitive information through social engineering tactics. Also, how hackers have exploited weak systems to install malware to steal sensitive corporate information.

This presents many new attack surfaces and digital risk which were never seen previously.

What are you expecting from threat actors next year? What do you think are some of the key targets that they will be setting their sights on?

Kumar Ritesh: 2021 will see the influx of new threat actors. Traditionally, cyberwarfare has been carried out by influential states. In 2020, we observed developing nations building cyber warfare capabilities and getting into the game of hacking to steal intellectual property to advance national interests.

State-sponsored cybercriminals are now actively involved in corporate espionage with competing nations, and at the same time, we are also witnessing the emergence of ‘hackers-for-hire’ where newly unemployed IT professionals are applying their tech skills to earn a quick buck.

Be it nation-state actors or opportunistic hackers, we expect financial services, manufacturing, and healthcare industries to continue being attractive targets for cybercriminals.

How important will digital risks be for CIOs in 2021? What will change from this year, in the next?

Kumar Ritesh: In the new ‘digital normal’, traditional perimeter defence is no match against the influx of cyber threats coming from all directions. Many businesses do not have a clear view of their attack surfaces, and even less understanding of their digital risk. We see several new developments which will impact the cyber landscape in 2021.

Geopolitical competition and alignment with superpowers will continue to magnify fault lines – US-Russia distrust, South China Sea and its claimants, China-India conflict, North and South Korean skirmishes. Nations-sponsored threat actors will drive the political agenda of their state masters leading to an increase in both volume and intensity of cyberattacks.

Remote workers coupled with legacy security set-up will continue to expand an organization’s attack surface in 2021. Cybercriminals have evolved their attack tactics to exploit remote workers who are the easiest and most vulnerable entry points into organizations.

This trend will continue given that many organizations continue to use legacy approach and security architecture, for example, VPNs and RDP, as enablers for remote working.

With zero-trust framework still not widely adopted, an increase in attacks is expected, with the ability to cause operational disruption, brand damage and financial repercussions.

Cybercriminals will escalate their ransomware attacks using three-phased modus operandi where they would infiltrate the network, exfiltrate and encrypt data, and demand ransom while threatening to ‘name-and-shame’ victims on public sites.

Ransomware-as-a-service (RaaS) will see an uptick where low-skilled hackers are able to rent ransomware code, customize it, and deploy in real-world attacks.

The emergence of deep fake technology presents a new risk to many organizations. The technology enables threat actors to disguise their identities and masquerade as politicians, celebrities, and authority figures. Hackers will leverage this technology to imitate faces and voices to extract not just data and assets, but also to influence perception and user behaviour.

The pandemic has brought on an onslaught of devices such as temperature screening, facial recognition, contact tracing, and location-tracking systems. These equipment collect important behavioural data that can be monetized to manipulate populations and communities. In 2021, corporate espionage will include theft of behavioural data as business rivals attempt to out-do one another.

What are three things businesses can do to prepare for an increasingly sophisticated cyber landscape in the new year?

Kumar Ritesh: Build basic level of cyber hygiene by focusing on 4 pillars - people, technology, process, and governance. 

People

  • Train employees on how to recognize cyber threats and risks, particularly social engineering tactics

Technology

  • Incorporate layered defence approach by having data and endpoint security, and gateway-based security solution
  • Use reputable anti-virus, web control, data loss protection and VPN solutions

Process

  • Perform threat profiling, creation of threat segmentation, zoning and risks containerization
  • Design data management and protection processes where critical data is encrypted and vaulted with an air-gapped solution
  • Ensure critical data is backed-up regularly with RTO (recovery time objective) and RPO (recovery point objective) clearly defined

Governance

  • Incorporate a digital risk discovery and cyber-intelligence program to identify threats early and pre-empt impending attacks

Related:  Getting away with not paying ransomware
Tags: COVID-19cybersecurityCYFIRMAPodchatsremote workingthreat actorsvpnZero Trust
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe