Accenture Security Report identifies top cyber threats in 2017 - OUTSOURCING-TODAY.RO
Latest News  

Accenture Security Report identifies top cyber threats in 2017

Destructive ransomware, alternative crypto-currencies and increased use of deception tactics among threats driving even more lucrative criminal marketplace are among top cyber threats in 2017 identified by Accenture's latest report.

2017-08-29 19:35:33

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, reveals how threat actors are continuing to evolve their ability to avoid detection. Based on in-depth analysis, the report anticipates a growth in the number of threat actors who are rapidly expanding their capabilities due to factors such as the proliferation of affordable, customizable and accessible tools and exploits.

The 2017 Cyber Threatscape Report examines key trends during the first half of 2017 and explores how cyber incidents may evolve over the next six months. This report relies on iDefense intelligence collection, research, and analysis including research using primary and secondary open-source materials. It covers the increased prevalence of destructive attacks and adversary denial and deception tactics; the aggressive use of information operations by nation-states; growth in the numbers and diversity of threat actors; as well as the greater availability of exploits, tools, encryption, and anonymous payment systems available to malicious actors.

"The first six months of 2017 have seen an evolution of ransomware producing more viral variants unleashed by potential state-sponsored actors and cybercriminals. Our findings confirm that a new bar has been set for cybersecurity teams across all industries to defend their assets in the coming months," said Josh Ray, managing director at Accenture Security. "While the occurrence of new cyber attack methods is not going away, there are immediate actions companies can take to better protect themselves against malicious ransomware and reduce the impact of security breaches."

Other notable observations from the report include:
• Reverse Deception Tactics – Increasing cybercriminal use of deception tactics including anti-analysis code, steganography, and expendable command-and-control servers used for concealment of stolen data. Greater public reporting on cyber threat activity and attribution may accelerate this denial and deception trend, increasing the cost of cyber defense efforts and resource allocations.
• Sophisticated Phishing Campaigns – Cybercriminals continue to craft familiar lures—subject lines mentioning invoices, shipping, resumes, wire transfers, missed payments— but ransomware is displacing banking trojans as one of the most prevalent types of malware delivered via phishing techniques
• Strategic Use of Information Operations – Escalation of espionage and disruption activity from state-sponsored actors may likely continue in response to fulfilling strategic collection requirements and geopolitical triggers such as economic sanctions, military exercises and religious conflicts.
• Alternative Crypto-Currencies – Bitcoin continues to be the currency of choice among cybercriminals, however, the need to better conceal transactions is forcing cybercriminals to either develop and leverage bitcoin laundering techniques or adopt alternative cryptocurrencies.
• DDoS-for-Hire Services – Distributed denial of service (DDoS)-for-hire services have given way to a thriving DDoS-for-hire botnet ecosystem leading to threat actors gaining greater access to increasingly potent and affordable DDoS-for-hire tools and services.
Effective components for a business continuity plan include:
• Adopt proactive prevention – Recognize phishing scams through prevention training and awareness programs. Make it easy for employees to report fraudulent e-mails quickly, and keep testing internally to prove the training is working.
• Elevate e-mail controls – Maintain strong spam filters and authentication. Scan incoming and outgoing e-mails to detect threats and filter executable files. Consider a cloud-based e-mail analytics solution.
• Insulate your infrastructure – Remove or limit local workstation admin rights or seek out the right configuration combinations (e.g. (virus scanners, firewalls). Regularly patch operating systems and applications.
• Plan for continuity – To avoid paying any ransom have a strong cyber resilience plan for recovery that is regularly reviewed, updated, and tested.

About Accenture

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions – underpinned by the world's largest delivery network – Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 411,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com.

Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations' valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown.


0 COMMENTS ^ Go back to Top
WRITE A COMMENT ^ Go back to Top
 
Your email address will not be published.
Nickname
Email
Comment
Validation Code
   
 
 
NEWS
Larry Ellison announced the availability of Oracle Autonomous Transaction Processing

Oracle Executive Chairman and CTO Larry Ellisonrecently marked a major milestone in the company's autonomous strategy with the availability of the latest Oracle Autonomous Database Cloud Service, Oracle Autonom

 Read Full article »
Ness Digital Development center in Iasi expands activity, creates new jobs

Ness Digital Engineering, one of the leading global providers of IT services, is consolidating the activities of its center based in Palas Iași, adding two major companies in the field of telecom, media & ente

 Read Full article »
BearingPoint expands its Security Advisory Center of Excellence in Romania

Technology consultancy company BearingPoint announced that it is expanding its Security Advisory Center of Excellence (CoE) in Romania.

 Read Full article »
Connections signs partnership with UiPath, aims 5 mln Euro from robots in 2019

Digital transformation company Connections, operating in Romania, Bulgaria and Serbia, has signed a partnership with UiPath, the Enterprise Robotic Process Automation (RPA) platform with the fastest acquisitio

 Read Full article »
Endava marks IPO and first day of trading on New York Stock Exchange

Endava opened for trading on the New York Stock Exchange (NYSE) under the ticker symbol "DAVA" following its initial public offering.

 Read Full article »
Colliers: Co-working changes Romanian office leasing data

The end of the first semester has brought into light great achievements from regional cities in all real estate segments. Bucharest has also performed well and, according to the real estate consultancy company

 Read Full article »
Atos, closer to acquire Syntel

Atos and Syntel have entered into a definitive merger agreement under which Atos will acquire Syntel for cash consideration of c. 3.4 billion US dollars, 41.0 Us dollars per share, representing apx. 14 per cent

 Read Full article »
Turkey's TotalSoft completes acquisition of Romania's Architected Business Solutions

Turkish-owned software company TotalSoft said on Monday it has completed the acquisition and merger of Romanian business management consultancy group Architected Business Solutions (ABS). The deal was announced

 Read Full article »
SAP and Lufthansa launch world's first "Aviation Blockchain Challenge"

The Lufthansa Innovation Hub and the SAP.iO Foundries program in Berlin launched the "Aviation Blockchain Challenge" to draw attention to the potential of blockchain technology in the aviation industry, uncover

 Read Full article »
Endava specialists put 3-month work in Via Transilvanica platform

The Via Transilvanica online platform, a concept initiated by the Tăşuleasa Social Association, was developed pro-bono by an Endava team in three months. A smartphone application, interactivity and tagging fu

 Read Full article »
 
 
MOST READ ARTICLES
» ROMANIAN OUTSOURCING AWARDS FOR EXCELL...
» The Outsourcing industry announces its...
» Committed to growth
» Genpact's COO: Staying ahead of the cu...
» PwC: The competitive advantages of Rom...
» Luxoft expands Asia Pacific presence w...
» Olga Botusan, Stefanini: There is a hu...
» Zitec's digital marketing division reg...
» EXCLUSIVE: ABSL Timisoara - BPO and SS...
» How does leadership look today?
 
EDITOR CHOICE
The long way from Learning to Development

How to succeed in reaching the young and the valuable employees and wining their hearts and minds, so they will forever be committed to gain knowledge, evolve in profession and build a strong career inside the

 Read Full article »
Synergy of skills

There are over 250.000 employees only in the class A and B office buildings in Bucharest and around one million employees spread around the city. How does the office market cope with the need of companies to ac

 Read Full article »
Risk management in industry 4.0. The risks are new, how is the management?

The ink is not yet dry in terms of GDPR's EU compliance regulations and the last few months have been a very useful exercise for everybody, either vendor, producer or consumer to understand that rigid concepts

 Read Full article »
In the search of the best next available resource, human or not

With the work demand expressed for the "traditional" job openings in ITO, HRO, BPO or SSC, the question formulated by the industry stakeholders points to some concerns regarding the future availability of the s

 Read Full article »
Competing in outsourcing: racing of endurance and skills

As Romania's outsourcing sector is currently estimated to employ more than 100,000 people, a constant evolution in the past years (with 15.000 employees registered in 2007), the local market is a popular nearsh

 Read Full article »
Latest News  
 
about us | newsletter | contact | members area | GDPR policy
Copyright © 2015 by Diplomat Media Events Design by Diplomat Media Events