SmartStateIndia
Reports

Mobile, Crypto, 5G: trends that will define cybersecurity in 2023

Sunil Sharma, managing director – sales, India; SAARC
In a world dominated by technology, we have seen rise in cyberattacks, both in terms of volume as well as complexity. The Sophos State of Ransomware 2022 revealed alarming findings that showed that 78% of surveyed organisations in India were hit by ransomware. In addition, more than 90% of Indian organisations that were attacked said these attacks impacted their ability to operate and led to a loss of business/revenue. Over the course of 2022, we continue to see cyberattacks taking place at a large scale, dominating news headlines, and crippling organisations for days.
Today, it is safe to say that with the commercialization of ransomware-as-a-service, cyberattacks are getting more brazen, and will continue to evolve in 2023.
Here’s are some cybersecurity trends to watch out for in 2023:
Mobile devices are increasingly targeted:
As mobile applications have become the dominant way in which people interact with the internet, mobile devices are at the center of a burgeoning range of new types of cybercrime. Not only are attackers still using fake applications to deliver malware injectors, spyware and banking-associated malware, but newer forms of cyber fraud have been growing in popularity, such as “pig butchering” schemes. Today, both Android and iOS devices are increasingly being targeted by fake applications; what is worrisome to note is that criminals have found ways to use social engineering to breach Apple’s walled gardens.
Crypto-related scams will increase:
The devaluation of Monero, one of the most popular cryptocurrencies for cryptominers, led to a decrease in one of the oldest and most popular types of cryptocrime—cryptomining. There is also a rise in crypto-related mobile apps in the form of fake wallets that are used to scam investors. Additionally, crypto-related scams are continually shifting and mutating, swinging from fake cryptocurrency investment to fake crypto derivative investments, and into other fake financial markets.
5G will bring about increased cybercrime:
The recent launch of 5G in India will be a game-changer for technology adoption in India. 5G technology, will improve on its predecessors with faster speeds, higher bandwidth and lower latency, which will likely make it more common than 4G ever was. While the faster speeds definitely have their advantages for users, they’ll also cause disadvantages, since hackers will be able to exploit its speed.
Attacks on the cloud supply chain will disrupt firms:
As enterprises continue to move applications to the cloud, reliance on third parties and partners increases, which also raises the risk of threats via the supply chain. Log4J has already proven how numerous organisations can be impacted by a piece of dependent code that is incorporated into the software packaging process. There is already and increase in cyberattacks using weak supply chain practices which will continue in the near future, unless active threat hunting methods are deployed.
In light of the above, there is a strong need for enterprises and individuals to protect themselves and their data. Organisations also need to have a robust cybersecurity strategy in place, in order to mitigate threats, and prevent damage to the businesses’ reputation and finances. Additionally, proactive response plan development allows internal teams to evaluate different response protocols and be better prepared in case of any cyberattacks.
A few best practices that organisations can implement are:
Leverage cybersecurity-as-a-service (CSaaS): Through this security model, outsourced specialists provide companies with urgently needed defenses and on-demand intervention. By outsourcing all security operations or augmenting existing teams, organisations can ensure 24/7 threat hunting, detection and response capabilities. This is made possible through managed detection and response (MDR), a core CSaaS offering.
Maintain good IT environment hygiene: Robust IT environment hygiene minimizes the likelihood of incidents occurring—so routinely check your security controls and address any unpatched vulnerabilities, like open remote desktop protocol (RDP) ports.
Keep a hard copy of your incident response plan: Always have a physical copy of your incident response plan on hand. If your organization is hit with ransomware, digital copies of your plan could be among the files encrypted.
Today cybersecurity has become so complex that organisations cannot afford to handle it on their own. In order to mitigate threats, enterprises should work with a trusted partner to implement robust security strategies and build a secure operating environment.

Related posts

Rashi Peripherals Limited reports 218.6% YoY jump in Q2 FY25 net profit at ₹ 699 million

SSI Bureau

IDC Reveals its Top Predictions for Security and Trust for India in 2023 and Beyond

SSI Bureau

New survey shows Vietnam among highest in online piracy in Southeast Asia

SSI Bureau

3 comments

Janet June 29, 2024 at 2:23 am

Fantastic perspective! The points you made are thought-provoking. For additional insights, check out this link: FIND OUT MORE. What do others think about this?

Reply
SandraLew August 20, 2024 at 12:24 am

cbd gummies for sleep have been a game-changer in requital for me! They’re opportune, mouth-watering, and a great personality to enjoy the benefits of CBD discreetly. I’ve found that they help me unwind after a fancy lifetime and parallel with put my drop quality. Extra, wily definitely how much CBD I’m getting in each gummy makes it untroubled to make it my dosage. If you’re curious involving infuriating CBD, gummies are a gifted starting point. Justifiable be certain to on a virtuous sort with high-quality ingredients after the superlative observation!

Reply
Izveidot personīgo kontu October 6, 2024 at 2:51 am

Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?

Reply

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More