Connect with us

Published

on

Endpoint devices frequently used by companies today can cause companies to be exposed to cyber attacks. So, what are the top 5 cybersecurity and data loss trends in endpoint security for 2024?

One business network While endpoint devices, which are one of the most vulnerable links, provide companies with convenience in matters such as mobility, communication and efficiency, they can cause vulnerabilities in terms of cyber security (endpoint security).

Due to their endpoint devices, companies can become targets of various cyber attacks, including ransomware, crypto theft, phishing and fileless malware.

From artificial intelligence (AI)-driven phishing attacks on endpoint devices, it’s imperative for corporate IT teams to be wary of new employees.

What are the top 5 cybersecurity trends and what precautions should be taken for effective endpoint security?

ENDPOINT SECURITY

Endpoints can become critical threat vector for data loss

More than 70 percent of data loss cases in companies originate from employee endpoints. This is largely because IT investment and focus has shifted to where data lives (the cloud) rather than where it is lost (the edge).

After several years of heavy investment in cloud security, attention will turn to endpoint security as the number one threat vector for data loss in 2024. When assessing the risks of data loss, company IT professionals can expand their focus beyond just protecting where the data resides and work to protect the exit points from which data leaks.

Companies can evaluate potential endpoint-based data loss use cases and invest in additional endpoint-based DLP solutions to strengthen their existing data loss strategies.

Endpoint Detection and Response (EDR)

Artificial intelligence will make combating phishing attacks increasingly difficult due to its ability to mimic human behavior and adapt tactics to the intended target.

Sophisticated phishing attacks are already using AI-generated content to create deceptive emails that closely resemble legitimate workplace communications, potentially tricking targets into revealing sensitive company data.

AI-driven phishing attacks against businesses may begin to evade traditional rules-based detection systems and EDR deployments. To develop defenses, DLP programs can be checked and policies can be tested against the most common exit points for phishing-related data loss (for example, email).

Startups put their employers at risk of lawsuits

It’s easy for employees to leak valuable intellectual property (IP) and other sensitive data when they leave an organization. Although there are situations that go unnoticed most of the time, these damages can cause trouble for institutions when they are noticed.

Cybersecurity teams rightfully focus on data loss, but in 2024 unauthorized data entry will become just as important. Cybersecurity teams need to be aware of the data new employees bring with them.

To counteract this situation, existing security tools can be checked and controls can be provided to restrict data entry to startup endpoints.

MacOS operating system’s corporate market share exceeded 25%

The share of macOS in organizations has increased rapidly in the last few years and is predicted to continue to increase in 2024.

In fact, Cisco’s year-long trial on its own workforce in 2023 found that Macs are less vulnerable to cyber threats and require less IT admin support, making them cheaper over time.

Many of the major platform cybersecurity solutions used by businesses were originally designed for Windows devices and have been ported to macOS. This situation can create vulnerabilities in data security protection due to incompatible features between policies created for Windows and policies created for macOS.

Organizations need to invest in solutions built from scratch for the operating systems they need to protect.

Sensitive data is at greater risk

Many companies updated their working models after the pandemic and chose the hybrid working model. So, while remote working levels are certainly not at the heights seen during the COVID-19 pandemic, challenges around protecting sensitive data remain.

One compelling perk of the increase in remote work in 2020 is that sensitive data has never been more accessible or shareable.

In a hybrid work model where workers move between locations, networks, connectivity, and applications, the endpoint remains the only true constant.

Organizations can evaluate their current security strategies to audit their effectiveness in implementing DLP capabilities at the endpoint level.

Gaps (for example, the ability to stop data leaking when an endpoint is offline or to identify and block unstructured data shared via messaging apps) can be addressed with custom solutions for endpoint security.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Life

Beware of romance scammers

Scammers asking for money or photos are a thing of the past. Romance scam methods have evolved.

Published

on

Scammers asking for money or photos are a thing of the past. Romance scam methods have evolved.

The number of people using messaging applications exceeded 3.3 billion in 2023. WhatsApp, Facebook Messenger and WeChat are among the most used applications.

Scammers look to these platforms for the love of money or data. Messaging apps are becoming a platform for both phishing and online romance scams, among other threats.

From 2019 to 2022, the amount of losses attributed to romance scams reported to the U.S. Federal Trade Commission increased from $493 million to $1.3 billion. Social networks and messaging apps were the first communication platform for 59 percent of those who said they lost money to a romance scam in 2022.

Scammers asking for money or photos are a thing of the past.  Romance scam methods have evolved.

Fraud methods are changing

As general digital security awareness increases, fraudsters’ tactics are also changing.

They send a risky phrase to their contacts: “Let’s go chat somewhere else.” Often the victim is redirected to a new and unknown app offered on third-party app stores or websites.

This allows the user to download spy tools that can read private data on the smartphone. In such cases, the most powerful weapon is to have a reliable cyber security solution that can detect suspicious activities of the application running in the background.

How do romance scams work?

scammers, assumes false identities on dating sites. By befriending lonely people, they establish a close relationship with these people and may even propose marriage to these people.

However, they may soon ask you for money or to open a new bank account that they can use. They use these accounts to further their scams, turning the victim of a romantic relationship into a money mule.

Scammers asking for money or photos are a thing of the past.  Romance scam methods have evolved.

Red flags of romance scams

Making excuses to avoid meeting: The scammer will avoid meeting face to face despite repeatedly stating that he or she is willing to do so.

Things are moving very quickly: Your new “partner” will express deep interest/affection and perhaps a desire for intimacy, even though you have only been chatting for a few days.

Asking for money: Romance scammers often come up with a heartbreaking story about why they need money ASAP. They can also pose as wealthy people who can pay off their debts with interest but “cannot currently access their funds.”

Leaving secure communication: The scammer may ask to leave a dating service or social media site to communicate directly. When you only use reliable app stores with strict app review policies, your chances of getting scammed will decrease rapidly.

Continue Reading

Security

Launches Cyber ​​Security Education Program for Children

Within the scope of the Cyber ​​Security training program, many trainings ranging from internet security to copyright, from security settings to privacy are offered free of charge.

Published

on

Within the scope of the Cyber ​​Security training program, many trainings ranging from internet security to copyright, from security settings to privacy are offered free of charge.

Today, children are growing up in an age where online activities are a natural part of their daily routine. While children may seem adept at navigating the digital world, they remain vulnerable to a range of online risks, from viruses and ransomware to fake news and cyberbullying on social media and online.

Trend Micro since 2008 “Internet Safety for Kids and Families” (Internet Safety for Kids and Families) initiative helps children, parents, teachers and young people around the world prevent and address online risks.

Cyber ​​security

Cyber ​​Security training program It is offered completely free of charge

Within the scope of the ISKF initiative, Trend Micro has prepared a completely free special training program to raise cyber awareness among children, parents and teachers around the world and make children more resistant to cyber threats.

The Internet Security Series program for children aged 7-10, prepared within the scope of Trend Micro Cyber ​​Academy, includes 11 trainings in total, including Cyber ​​Security, Healthy Habits, Camera Security, Time Spent Online, Courtesy, Security Settings, Misinformation and Copyright. Trend Micro Cyber ​​Academy, which provides training in a total of 19 languages, including Turkish https://www.trendmicro.com/internet-safety/tr/cyber-academy can be reached at.

ISKF initiative is actively carried out in 19 countries

ISKF, which was launched in 2008, has grown rapidly and spread to 19 countries. Operating in a wide range from face-to-face events to online training, ISKF stands out as an important resource in the field of cyber security for children, parents and teachers. Cyber ​​Academy, created within the scope of ISKF, teaches young digital citizens how to stay safe in the digital world with interactive videos and narratives. Within the scope of the program, it is planned to reach approximately 10 thousand children and their families by the end of 2024.

Figures about ISKF

  • 444 students were reached
  • 356,010 families were reached
  • “What’s Your Story?” There were 4,470 participants from 13 countries in the video and poster competition
  • Hosted 312 events
  • 367 Trend Micro employees volunteered
Continue Reading

Security

EXPOSED TO RANSOMWARE ATTACKS

According to a recent study, 60% of healthcare organizations will be subject to ransomware attacks by 2023. For this reason, it is important for healthcare organizations to prioritize cyber security measures to detect potential threats and ensure patient safety.

Published

on

According to a recent study, 60% of healthcare organizations will be subject to ransomware attacks by 2023. For this reason, it is important for healthcare organizations to prioritize cyber security measures to detect potential threats and ensure patient safety.

Technology widely used in every sector, health and rose to an important position in the pharmaceutical industry. Advances in medical systems through technology have significantly improved patient care, reducing costs and increasing efficiency.

However, considering the abundance of data in the sector, healthcare institutions need to strengthen their cyber security measures, as they are vulnerable to external threats. A recent study shows that 60% of healthcare organizations will be subject to ransomware attacks by 2023. For this reason, it is important for the healthcare sector to adopt a comprehensive security approach. Especially when it comes to ransomware.

ransomware

3 advantages of cyber security against ransomware threat to healthcare organizations

  1. Ensures compliance with legislation: Firewalls are critical for compliance with regulations such as HIPAA (Health Insurance Portability and Accountability Act). But to be truly effective, they need to be structured correctly. For this purpose, certain rules are needed that allow only necessary data traffic from authorized network addresses. Blanket “permission” rules should be avoided because they may allow unauthorized access to PHI data.
  1. Protects medical devices: Due to the rise of Internet of Medical Things (IoMT) devices, a multitude of medical devices are now connected to each other, facilitating real-time monitoring and seamless data sharing. The most important disadvantage of this situation is that it poses critical security risks. Risks can be prevented with a firewall that divides the network into segments, creates independent subnets and controls the traffic between them, reducing the likelihood of threats spreading since they will not affect the entire network. Well-executed access control policies combined with active traffic monitoring provide increased security by providing greater control over the network.
  1. Improves network performance: In addition to improving security, firewalls also optimize network performance. By managing traffic flow, it can prevent unnecessary bandwidth usage while ensuring the smooth functioning of critical medical applications. This helps optimize overall network efficiency by reducing latency and improving response times.
Continue Reading

Trending

Copyright © 2023 RAZORU NEWS. Project by V