Internet Threats - Top 4 Web Security Threats to Watch Out for in 2015

| July 15, 2015

Internet threats are everywhere – are you confident that your network is safe? With advances in email security and open source intrusion detection tools, it’s getting easier for businesses of any size to nail down their data and IT systems. However, as anti-virus and cyber security programs grow in sophistication, so do the cybercriminals and hackers that create the threats. Here we cover the top 4 internet threats you should looking out for in 2015, and what you can do to prevent substantial loss in the future.

Ransomware

Ransomware is an insidious type of malware that restricts access to the system it infects, requesting a ransom payment to free the encrypted network or database. Growing increasingly powerful in its methods of infiltration, McAfee Labs warns that there is a strong risk of ransomware bypassing security software and attacking cloud-based storage modalities such as Dropbox, Google Drive, and OneDrive.

While some malware removal programs may derail more minor ransomware attacks, the heavy hitters, like Cryptolocker, force you to pay up to defend against ransomware Internet threats. Your best bet is to frequently back up your files on a separate physical device, initiate System Restore at the first sign of an attack, or use DrivePop CryoStow, a fully secure cloud backup program.

Cyber Theft

As more and more consumers use contactless and mobile payments, hackers capitalize when stored payment data is less than secure. While payment technology is advancing, it still won’t protect retailers who don’t securely store payment card data, putting customers at risk.

Third-party attacks are a related threat, such as the major data breaches that occurred at Target and Home Depot. Cybercriminals crave convenience, and know that contractors and third-party providers open clear channels into otherwise secure corporate systems.

Insecure Passwords

It seems obvious, but weak passwords continue to be a significant risk in 2015. Especially when it comes to cloud systems and programs, an easy-to-crack password is no joke. As a result, passwords may slowly get phased out in favor of multi-factor security options. Primarily the means for password recovery are flawed, such as asking questions that only the account owner should know. Unfortunately, it’s too easy for hackers to deduce this info based on easy online access, making it necessary for passcode security to take a new, more permanent direction to defend against one of the most common Internet threats.

Social Media Attacks

As companies catch on to the power of social media, so do cybercriminals recognize these platforms as ripe targets. According to Mark Bermingham, director of marketing at Kaspersky Lab, social media is the gateway to water holing attacks. A water holing attack is a strategy that compromises a website or service to infect multiple members of a target group, allowing the malware to exponentially spread throughout the system. Security measures are useless against stolen information and click-throughs. Enhanced awareness is the greatest defense as hackers increasingly leverage the ripple effect that water holing can trigger.

While this list has only touched on a few of the many threats existing on the World Wide Web, the best prevention is to keep all your hardware, software, and service updated, and to reinforce the importance of information sensitivity with your staff members. For more information on the best security tools to use against Internet threats, get in touch with the Infidati team.