Safeguarding against next-gen cyber risks


The notion that cyber security is ever-shifting is widely understood, but it’s important to define what this means, exactly. The scale and impact of cyber crime has dramatically increased over time. In the last decade, in particular, the rise of ransomware has made cyber security a major talking point at the highest levels, and in the boardroom.
So what’s changed? For starters, the cyber crime industry has undergone a radical transformation into a more professional and industrialized outfit, with established supply chains and markets. Alex Holland, senior malware analyst at HP, tells TechRadar Pro that far from the stereotype of “hackers in hoodies”, cyber crime now really is “big business”. Indeed, according to research by HP, the dark web is fuelling the way cyber criminals collaborate, trade, support each others’ attacks, and monetise attacks too.
One of the immediate threats in this shifting landscape, as far as enterprises are concerned, has been managing their workforce during the pandemic and in the aftermath with the rise of hybrid work. “That’s created a lot of challenges for enterprises, because they need to configure their devices remotely, they need to defend their devices remotely, and we know that endpoint visibility – in terms of security and detecting threats – has always been a challenge for the enterprise,” Holland explains. “Also, enterprises need to be able to defend and recover from these attacks should the worst happen.”
This blurring of the lines between an employee’s personal life and professional life, too, poses a major risk for businesses. Research HP published last May revealed 71% of employees say they access more company data, more frequently, from home. At the same time, more office workers are increasingly using their work devices for personal tasks – with 70% admitting to using work devices for doing personal tasks like checking emails.
“We find that using work devices, in particular, for tasks like opening webmail is very dangerous. Email is the top vector,” he continues. “We consistently see that from the data that we analyze in my team, and email is essentially a direct route into the enterprise. Once you’ve compromised an endpoint, it allows attackers to spread laterally and really cause a lot of damage.”
Ransomware, meanwhile, continues to be a thorn in the side of enterprises across the globe. Identifying how ransomware is evolving, though, might help contribute to the defensive efforts. The threat has shifted from an opportunistic type of cyber attack, say, ten years ago, into one that’s calculated, deliberate and involves multiple elements. For instance, Holland explains, rather than aiming to encrypt a single device, operators might target an entire fleet of devices. In order to achieve these complex goals, though, hackers specializing in different areas are beginning to collaborate with each other.
“For example, every intrusion requires an entry point,” Holland says. “Unauthorized access is really important and really valuable in the cyber crime ecosystem. So, what we find in these dark web marketplaces [is] you have threat actors who are specializing in selling unauthorized web access, or initial access.”
Holland says HP aims to counter these threats by building security into the hardware – which is complemented with the Endpoint Security Controller hardware chip. This secure-by-design approach relies on having a firm foundation and verifying the integrity of a system. The manufacturer supports an array of security features, ranging from firmware security to detecting malware running in memory to isolating risky activities. The other side of the equation is configuring devices before they’re shipped to employees, with HP offering services to provide a company’s preferred security configuration right from the production line.
“We’ve been working on secure by design hardware for more than 20 years, and one of our key focuses has been on resilience,” Holland says, with HP’s approach a combination of preventing attacks, detecting malware and other threats, and recovery.
“It’s very easy to be a doom monger and talk about how bad cyber security and cyber crime is,” he continues. “I think there is actually hope to reduce cyber crime, but it requires a collaboration between Intel and HP, [and] it requires interventions from governments.
“We need to increase the effort required for attackers to successfully compromise networks – and we have the technologies available to do that. We also need to reduce the rewards that when they do compromise these networks; that they’re unable to access crown jewels.”
To hear our full conversation with HP’s Alex Holland and learn more about which tools and techniques businesses can use to mitigate the threats posed by the changing cyber crime landscape, watch the video above
Audio player loading… The notion that cyber security is ever-shifting is widely understood, but it’s important to define what this means, exactly. The scale and impact of cyber crime has dramatically increased over time. In the last decade, in particular, the rise of ransomware has made cyber security a major…
Recent Posts
- The shape of things to come? Nvidia’s super fast 800GBps SuperNIC card spied and this Connect X-8 AIB vaguely resembles a GPU
- Two AI chatbots speaking to each other in their own special language is the last thing we need
- Samsung’s 9100 PRO SSD line includes its first 8TB NVMe model for consumers
- Sonos speakers and soundbars are 25 percent off for existing customers
- Xbox Cloud Gaming will let you invite friends with just a link
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010