ChannelVision Magazine

serious need of a security makeover, according to Sophos. “Organizations of all sizes are starting 2018 with inadequate protec- tion against ransomware, despite last year’s international headlines,” said Schiappa. “Given the ingenuity, frequency and financial impact of attacks, all businesses should re- evaluate their security to include predictive security technology that has the capabilities needed to combat ransomware and other costly cyber-threats.” Geopolitical Factors It’s also important to view cyber- security through a contextual lens: Economic pressures and sanctions, jihadist activity and rising tensions around the world will spur cyber- activity in 2018. Flashpoint’s latest Business Risk Intelligence (BRI) Decision Report found that the top trends and indicators for cyber-risk de- cision makers to watch in 2018 include tensions in East Asia over the North Korean nuclear program, the impact of official U.S. policy changes on the Ira- nian nuclear accord, U.S.- and European Union-led economic sanc- tions on Russia, U.S. recognition of Jerusalem as the capital of Israel and other nation-states’ adoption of the Russian model of engaging in cyber- influence operations. Meanwhile, the power struggle between Saudi Arabia and Iran for influence in the Middle East fuels ongoing conflict within the region, as does the continued instabil- ity and violence in Syria. “Few would say that 2017 was an uneventful year in the realm of global geopolitics, and this year is already shaping up to be fraught with similar volatility,” said Jon Condra, director of Asia Pacific Research at Flash- point. “As such, organizations seek- ing to proactively combat relevant threats and address enterprise-wide risk must regard geopolitical context as a core component of their intel- ligence programs.” Russia and China are the two nation-states with the most concern- ing capabilities, the report said. Both are considered to possess the highest levels of technical sophistication, re- served for only a select set of countries. The actors can engage in full-spectrum operations, utilizing the breadth of ca- pabilities available in cyber-operations in concert with other elements of state power, including conventional military force and foreign intelligence services with global reach. The capabilities they have are thus alarmingly advanced, ac- cording to Flashpoint. “Kinetic and cyber-attacks con- ducted by the threat actor(s) have the potential to cause complete paralysis and/or destruction of critical systems and infrastructure,” the report found. “Such attacks have the capacity to re- sult in significant destruction of prop- erty and/or loss of life. Under such circumstances, regular business op- erations and/or government functions cease and data confidentiality, integ- rity, and availability are completely compromised for extended periods.” For Russia’s part, its state-spon- sored hacking arms (such as the well- known Fancy Bear group widely consid- ered responsible for hacking the DNC during the 2016 Presidential election) remain highly active, capable and influ- ential, the report said, with retaliatory and cyber-influence activity expecting to ramp up as it is increasingly isolated from the West following election interference and information operations against Western democracies. “Moreover, Moscow con- tinues to crack down on digi- tal dissent and segregate it- self from the global internet,” the report found. “The result is a country moving quickly toward a unique model of domestic information control via technical control of inter- net infrastructure, services and data, a lack of online anonymity, and censorship.” As for China, it too re- mains an active and highly ca- pable actor in cyberspace on multiple levels, although state- sponsored activity against Western targets has dropped off a bit. The report cautions decision makers not to grow complacent. “In 2017, Chinese actors were linked to some notable attacks, how- ever, and Beijing forged ahead with the implementation of the National Cyber- security Law and subsequent regula- tory changes with respect to the inter- net, and continued its crackdown on cybercrime and illicit content online,” said the report. “Chinese policymakers and military planners have long recog- nized the utility of cyber-espionage and cyber-weapons as a means of fueling economic growth and diminishing the U.S.’s advantage in the event of a con- ventional military conflict.” Financial Gains and Exploits The top risks for 2018 also include attacks from financially motivated cybercriminals, who remain an ac- tive, and dangerous, presence on the Cyber Patrol Source: SolarWinds MSP Source: Sophos; Vanson Bourne Hit by ransomware, by sector 1% 0% 0% 7% 10% 11% 13% 5% Total Healthcare products and technologies Energy, oil/gas and utilities Business and profesional services Retail, distribution and transport IT, technology and telecoms Public sector Manufacturing and production Construction and property Media, leisure and entertainment Other commercial sector Private education Financial services drive, mobile device, or USB storage media that contained sensitive data Employee victimized by fraud or social media harassment at work or home Other Cato vs. MPLS: Annual Spend Comparison Source: Cato Networks; Fisher & Company US UK Total 54% 76% 65% 59% 58% 55% 54% 51% 49% 48% 48% 47% 45% Yes, we have been hit by ransomware in the last 12 months WAN Optimization $7,000 Connectivit $84,000 Other $233,000 Last Mile $85,000 Cato Cloud $30,000 Cato + Internet $115,00 MPLS $324,000 Channel Vision | January - February, 2018 16

RkJQdWJsaXNoZXIy NTg4Njc=