The web site is now storing only essential cookies on your computer. If you don't allow cookies, you may not be able to use certain features of the web site including but not limited to: log in, buy products, see personalized content, switch between site cultures. It is recommended that you allow all cookies.

Cybersecurity Unveiled: Navigating the Current Landscape and Mitigating Risks

Cybersecurity Unveiled: Navigating the Current Landscape and Mitigating Risks

Ashwill Botha – Moore Forensic Services Cape Town

Approximately two decades after the computers were modernised in the 1950s, the first computer virus, known as the "Creeper system," was created by BBN Technologies in 1971. Its primary function was to fill the hard drive, rendering the computer inoperable[1]. Cybersecurity has significantly evolved since then, and it's crucial for everyone using computer operating devices to understand how to protect both their devices and their digital data and information.
 
In 2004, a collaboration between the government and industry led to the creation of a cybersecurity awareness initiative, aimed at ensuring individuals know how to stay secure and safe online.[2]
 
Globally, cybercrime costs are rising at an average annual rate of 15 percent, with estimates suggesting that by 2025, it will cost businesses $10.5 trillion annually[3] (or R194 trillion at the current R /$ exchange rate of R18.47 / $1). The Council for Scientific and Industrial Research (CSIR) has reported that the impact of cybercrime on South Africa's economy is currently estimated at R2.2 billion per annum. South African firms are among the top eight targets for ransomware attacks with recent cybercrimes in South Africa affecting credit bureaus, healthcare, retail groups, government departments, and banks.
 
Due to the general intent of cybercriminals being the theft of data for the use to cause financial loss and mental stress, it is important to emphasise the benefit of understanding the types of cybercrimes and how to mitigate the risks.[4]
 
Based on a study by the University of San Diego, the following cybersecurity threats and trends for 2023[5] have been identified:
  • Vulnerability in the Cloud: It is weaknesses in a Cloud storage environment that attackers can exploit to gain unauthorised access to steal data or disrupt services.
  • Data breaches: a security incident in which unauthorised access to sensitive data or confidential information has been obtained.
  • Hybrid or remote work environments: Unauthorised access to sensitive data due to employees connecting to unsafe Wi-Fi networks, using personal devices for work, employing weak passwords, and sharing files without encryption.
  • Mobile attacks: Undetected mobile malware designed to damage, spy, disrupt, or gain unauthorised access to clients, computers, servers, or networks.
  • Phishing: The fraudulent practice of sending deceptive emails or messages to obtain personal information, such as passwords or banking details.
  • Ransomware: Malicious software that blocks access to computer systems until demands (such as ransom payments) are met.
  • Cryptojacking: Exploiting computers or devices to mine cryptocurrencies without the user's knowledge or consent.
  • Cyber-physical attacks: Security breaches that damage property, impact operations, or affect the physical environment.
  • State-sponsored attacks: Cyber warfare sponsored by a government or state entity to target individuals, businesses, organisations, or other governments.
  • Information-of-Things (IoT) attacks: Malicious exploitation of vulnerabilities in internet-connected devices, such as smart home devices, industrial control systems, and medical devices.
 
Knowing what cybercrimes are trending in today’s world, the following can be done to ensure risks are mitigated against. The following are some actions that can be taken in response to potential risks4:
  • Minimise data transfers by being mindful of the number of devices containing important and sensitive information, and limit transfers.
  • Verify download sources by using legitimate links and, before downloading, scan the website to ensure it is verified. Most anti-viruses have this functionality.
  • Keep software up to date by continuously updating applications.
  • Encrypt (Protect) data through using encryption software to protect data from external parties.
  • Monitor data with data breaching monitoring software that will alert you when suspicious activity has been identified with regards to your data.
  • Implement a breach response by having a plan in place for if an unfortunate data breach occurs to minimise damage and speed up recovery.
 
As one navigates the digital age, it's imperative that one remains vigilant, well-informed, and prepared to face the ever-evolving challenges of cybersecurity. By staying educated and proactive, one will be able to secure one’s digital life, protect information, and ultimately contribute to a safer and more resilient digital world for all.
 
Contact your local Moore office for more information or assistance. Click HERE.