Hackers now masquerading as 'compromised' employees: Forcepoint

Image
IANS Bengaluru
Last Updated : Nov 20 2017 | 6:42 PM IST

Hackers are no longer going for traditional security breaches but are attacking individual machines via spam emails -- thus masquerading as "compromised" employees to enter the organisation and hold the whole system to ransom, a top executive from global cybersecurity firm Forcepoint has emphasised.

According to Surendra Singh, Country Director, Forcepoint, The human-centric security framework is very important to ward off cyber attacks.

"Hackers are no longer going after traditional security like firewall and are actually attacking the employees through official mails. Once done compromising the machine, the hacker is now masquerading as an employee and his behaviour is very, very different," Singh told IANS.

"Hackers are enticing subjects accounts and ask you to click upon a link. You click the link, the machine gets compromised and then, you become a kind of breach head for that hacker to enter the organisation," he noted.

One way to prevent such a crime is to closely monitor the behaviour of employees -- the IT usage patterns once the employee has been compromised.

The risks get bigger with the faster adoption of Internet of Things (IoT) devices, Singh said.

"IoT can become Disruption of Things. We may face industrial disasters because of IoT process controls getting compromised. This is a very scary scenario," Singh told IANS.

Forcepoint on Monday launched its 2018 Security Predictions Report, emphasising that the traditional security perimeters are eroding or becoming obsolete.

Understanding how, when and why people interact with critical data, no matter where it is located, is crucial.

Critical data continues to move to the Cloud, malware is constantly evolving, and despite growing investments in defensive technologies, traditional security controls prove ineffective, the report said.

"At the heart of our predictions is a requirement to understand the intersection of people with critical data and intellectual property," said Dr Richard Ford, Chief Scientist at Forcepoint.

"By placing cyber-behaviour and intent at the centre of security, the industry has a fighting chance of keeping up with the massive rate of change in the threat environment," Ford noted.

Forcepoint predicted that 2018 will ignite a broad and polarising privacy debate, not just within governments, but between ordinary people.

As cryptocurrencies grow in importance, including as a method of extracting revenue from cybercrime, Forcepoint forecasts that the systems surrounding such currencies will increasingly come under attack.

"Attackers will target vulnerabilities in systems which implement blockchain technology," the report said, adding that IoT will not be held to ransom but will become a target for mass disruption".

A new threat that will emerge in 2018 is the disruption of things.

As the IoT offers access to both disruptive possibilities and massive amounts of critical data, we will see attacks in this area, and may also see the integration of a man-in-the-middle (MITM) attack, the report cautioned.

"In case of a compromise, you have to involve legal teams, you have to involve your CFOs -- you must notify all the people impacted. So there has to be a robust plan in place as a reactive measure," Singh said.

--IANS

ksc/na/bg

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Nov 20 2017 | 6:34 PM IST

Next Story