Mail security for 2017 forecasts

Dec

24

2016

Ray Cavite, Vice President – Middle East, Turkey and Africa , “Otevo” Attivo

Cyberspace Features changed in a flash. Can security measures is not enough to be very expensive for the companies also have serious consequences in the long term. Rapid digitization process of technological transformation in the region, by Internet hackers have contributed to the side of the wealth enjoyed by the countries in the region to open doors to cyber attacks.

In the wake of the launch of smart services, mobility and Internet of things, increased the geographical area targeted by these groups dramatically. 2016 was another year of record electronic attacks on websites private sector banking, aviation and government in the Middle East and it is unlikely that this trend is changing in the near future.
Increase the frequency of violations malware POS

It may seem that the number of attacks that directly affect the retailers and the theft of customer data are decreasing. In fact, this is not true, the number of attacks seems less due to non-availability of the information disclosed, as well as the gradual shift in the focus of the attacks from the retail sector to other sectors, such as the sectors of travel and restaurants.

The attackers began to change their approach, through more focus on retail and small business merchants, driven by the large number of those targeted institutions and non-use of the infrastructure of advanced information technology. The basic problem is still about violations targeting POS without actual solutions on a large scale.

It continues to thousands of POS systems work without the use of any form of anti-virus software because of its use for the old operating systems like Windows XP systems and “trust” in relations with the asset management servers. By targeting asset management systems, malware can spread itself is remarkably POS en masse.

Through this collective deployment attacker could keep communications open to further modernize new variants of malware and send electronic orders and data theft. These attacks are considered one of the biggest weaknesses of high-risk and that could take several months, or perhaps years, before discovered.

This is cause for concern, especially with expectations for a rise of e-commerce market value in the United Arab Emirates to 40 billion dirhams (about $ 11 billion) by 2020, according to Frost & Sullivan.

Moreover, with the increased use of TOR network and the high value of the personal data stolen and sold on the black online market amounts ranging between $ 5 and $ 30 for each credit card or a debit card stolen, the stimuli to target POS systems will remain high.
Budgets will give priority to the techniques of “disclosure” on the “prevention” techniques

With the continuing violations this year, a large number of heads of information security departments began studying the allocation of more budget allocations for the detection systems, so attackers can be identified within the network and stop them. Historically, more than 75% of IT budgets spent on IT sector solutions and preventive maintenance solutions.

However, a recent study carried out by Pierre Odeon Consulting, 200 decision-makers showed that they expect to spend 39% of the allocated to the security of information on detection and response techniques within the next two years the public budgets. Gartner predicted also that, by 2020, will be allocated 60% of the budget on information security detection and rapid response techniques, recording a rise of less than 10% in 2014.
Deception technology will become the most important means of detecting advanced threats

Gartner predicts that, by 2018, the 10% of companies will use the tools and techniques of deception, and actively participate in the deception operations against the attackers, and in closing the gap in the detection of attacks vague or unknown source.

In 2017, phishing technology will become the preferred solution for the detection of advanced threats. Gartner and called for the use of deception as a way to response, represents a major shift in capacity and in the future of IT security. The company said that the deception techniques is the most advanced approach for the detection of threats within the network and considered one of the top ten security trends for the years 2015 and 2016, and expects to remain so through 2017.
Low stillness time of the attacks

According to a variety of sources, the malicious software may not be discovered within the companies for several months, where it was discovered after some of them at least 200 days. With the increased focus on detection technology, there will be a decrease in sleep time and an increase in the number of violations detected by the internal information security teams, and historically, it has been revealed a violation of every five internal violations only. I expect that by the end of 2017, this number will rise to 50% of all violations that are detected internally by customers, and law enforcement agencies, and other third parties interested.
Joint cooperation and exchange of information drives efficiency

Frost & Sullivan estimates that spending on network security in the Gulf Cooperation Council (GCC) will reach a billion US dollars by the year 2018. Although this is encouraging, but the exchange of information and participation of no less importance than the campaign against cyber crime. Traders will continue to cooperate in the exchange of information and integration of solutions, allowing the exchange of data and provide security teams and one source of information about possible attacks.

The security teams will be able to see the real threats that may have missed them, and that came as a result of a partial look at the activities of threats throughout the network. And it will increase operational efficiency significantly, and will be available the best detection, faster processing, and response to incidents more effectively at the time of the attacks.

Google +
Linked
Facebook
Twitter

Viewing:-291

In: A Technology & Gadgets Asked By: [19503 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »


Star Points Scale

Earn points for Asking and Answering Questions!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]