Wednesday, January 11, 2017

What's going to bring us 2017, Sherlock?

The report of the week

Sherlock Holmes is probably the most famous detective in the fiction field. We saw him in many films, the last one in the BBC series, interpreted by the actor Beneditc Cumberbatch. On January 1st they released their fourth season, having the same success than in previous chapters.

If for some reason Sherlock Holmes has stood out is by his attention to the details. Through deductive skills and the use of the scientific method, he manages to solve anything, whether in the series, books or films.

As every year, cybersecurity experts dress up in their Sherlock-type coat and hat and try to deduce what this 2017 will provide us. This time, the clues give us and the person who is embodying the famous detective is Chris Goetll.

With the excuse of Patch Tuesday, the report begins by reviewing the major threats of 2016, dividing it into three parts:

  • Zero-day: Of the 9 exploits discovered this year, 5 were patched by Microsoft last Tuesday. Even though the total of 0-day has fallen compared to the last few years, we should not relax and let us take a false sense of security. The cyber-attacks will not disappear. What it's more, it seems to increase day by day.
  • Data breach: According to the ITRC data breach Report in 2016 the total number of attacks would reach the 980 gaps with more than 35 million files exposed. The two field most exposed would be government / military and health. On the other hand, it should be noted that the biggest data gap in history belongs to Yahoo, with two different attacks over a period of a few months.
  • Ransomware: E-mails have become the best access of 2016 for cybercriminals to insert a ransomware. According to an article by the blogger Jonathan Crowe, more than half of those affected people (59%) have been damaged by opening an email from their personal mail. In addition, according to the Osterman Research study, a user has more possibilities of being infected via mail that getting in a malicious place.

After having visited the scene of the crime and having all the possible information, it's time for the detective to analyze every clue. In our case, instead of catching the killer (that's not our job) we prefer to give some good tips for cyberdetectives so they don’t have to follow the path of crime in our networks:

  • Keep your software update: Both your operating system, app and programs installed on your devices must have the latest updates. Don't forget that both third-party applications and operating systems are susceptible to attack. 
  • Think before you click: We must spread this message everywhere. People need to know the high risk they have by clicking on a link or downloading content. 
  • Make sure you log in securely: Make sure that every time you use your personal data or credit card you do it on pages that use HTTPS. You don't need to make things easier for cybercriminals to steal your information.

In addition, we would like to highlight other reports that have caught our attention, such as the one on this page about problems and adapting the cybersecurity framework.Either we can't forget about the report written by Security Artwork that evaluates the Impact on the Protection of Personal Data.

As in every Sherlock Holmes story, those affected people trust the detective, we trust the cybersecurity experts. We encourage you to follow this famous researcher and carefully follow the advice offered to avoid Struggles in networks, worthy of a novel by Arthur Conan Doyle.


Post a Comment