5 New Cybersecurity Threats You Need To Be Very Prepared For This Year

Justin Donnaruma • January 31, 2024

Share Post

The year of 2023 marked a significant turning point for cyber-attacks with the introduction and wide proliferation of AI (artificial intelligence), now in the hands of people who wish to do you harm and who are actively using it to find faster and easier ways to rob you, extort you or simply burn your business to the ground.


As I write this, I'm well aware there's a tendency to shrug and just accept the "we're all gonna get hacked anyway" mantra to avoid having to deal with it. Further, like overhyped weather reports, it's also tempting to just ignore the warning signs, thinking all of this is just fearmongering rhetoric designed to sell stuff.


However, it truly is becoming a situation where the question is no longer IF your organization will be hacked, but WHEN. The Hiscox Cyber Readiness report recently revealed that 53% of all businesses suffered at least ONE cyber-attack over the last 12 months with 21% stating the attack was enough to threaten the viability of their business.


This year is going to be a particularly nasty one, given the U.S. presidential election along with the ongoing wars between Russia and Ukraine and Israel and Hamas. Tensions are high and hacking groups are often motivated by revenge as well as money.


Now, here are the 5 biggest developments in cyber threats you need to know about.


1. The Proliferation Of AI Powered Attacks:


If cybersecurity is a chess game, AI is the Queen, giving the person in possession the most powerful advantage for whomever plays it best. All cyber-related reports expect to see highly sophisticated deepfake social engineering attacks on the rise designed to separate you from your money.


We've already seen scams using AI-generated voices of family members, calling relatives to claim they've been injured, kidnapped or worse, to extort money. This is also being used to hack into companies by getting employees to provide login information to people they think are their IT department or boss.


This is where employee awareness training comes in, as well as controls such as MFA (multi-factor authentication), come into play. One of the things we do here at Don't Panic Consulting is Security Awareness Training to give your employees the skills to protect your company and identity attacks.


2. Increased Risk Of Remote Workers:


The expansion of remote work is a trend that is not going away; and with that comes an exponentially greater risk for cyber threats. From laptops being carried around and connected to suspicious Wi-Fi to mobile phones providing a "key" to logging into critical applications (like your bank account, Microsoft 365, line-of-business and credit card applications), these devices pose a high risk for being easily lost or stolen. Further, when people use their own devices or work remote, they tend to mix business and personal activities on the same device.


That employee who frequents gambling or porn sites may be using the same device used to login to company e-mail or critical applications. Even logging into personal social media sites that get hacked can provide a gateway for a hacker to get to YOUR company's information through a user's (employee's) personal accounts.


3. Escalation Of Ransomware Attacks:


There are an estimated 1.7 million ransomware attacks every day, which means every second 19 people are hacked worldwide. If you've been lucky enough to avoid this, know that someone else is getting hacked on a veryfrequent basis, and you are very likely to be hit.


Last year, ransomware attacks increased by 37% with the average ransom payment exceeding $100,000, with an average demand of $5.3 million.


Fortunately, not all ransom attacks are successful. Businesses are getting much smarter about cyber protections and have been able to put in place protections that prevent hackers from successfully extorting their victims. Some of the ways we protect our clients from ransomware is real-time backups of data, early-detection, and client isolation.


4. IoT Attacks:


IoT, or "Internet of Things," is a term to describe the proliferation of Internet-connected devices. Today, even kitchen appliances, like a refrigerator, can be connected to the Internet to tell you when it's time to change the water filter to alerting you if there's a power outage.


This means hackers have a FAR greater number of access points into your world. If there are 100+ more doors to walk through in a house, you have a much greater security risk than if there are only five. That's why IoT attacks present such a problem for us, and a huge opportunity for the hackers.


While many people know they should lock their PC, they might not be as meticulous in locking down their fridge or their dog's tracking collar, but those could all provide access to you, your devices, e-mail, credit card and personal information.


5. Cyber Protection Legal Requirements:


To try and combat the out-of-control tsunami of cybercrime, the government is initiating more comprehensive federal and state laws requiring business owners to have in place "reasonable security" protections for their employees and clients.


The FTC (Federal Trade Commission) has been the most active in this space, bringing numerous actions against companies it alleges failed to implement reasonable security measures, issuing monetary penalties.


Of course, all 50 states plus Washington D.C. have passed laws imposing security requirements as well as data breach notification laws that require businesses to notify anyone whose data and PII (personally identifiable information) has been stolen or accessed by hackers via the company. For example, in California, under the California Privacy Rights Act (CCPA), a business could face a penalty of $100 to $750 per consumer and per incident if that company gets hacked and the court determines they failed to put in place reasonable security procedures.


Not Sure If You're As Protected And Prepared As You Should Be?


To make sure you're properly protected, get a FREE, no-obligation Cybersecurity Risk Assessment. During this assessment, we'll review your entire system so you know exactly if and where you're vulnerable to an attack.


Schedule your assessment with one of our senior advisors by calling us at (207) 300-2300 or going to https://www.dpcco.me/discoverycall.


Justin Donnaruma

January 31, 2024

By Justin Donnaruma November 6, 2024
Phishing attacks are the most common cybercrime attack for one reason…they work. Every day, over 3.4 billion spam e-mails reach unsuspecting users' inboxes. Phishing e-mails have held the top spot as the most frequent form of attack for years because they're easy to implement, easy to scale and continue to fool people. AI tools like ChatGPT are now making it even easier for cybercriminals to create e-mails that look and sound like they're coming from humans instead of bots and scammers. If you're not careful, the effects of phishing scams can be detrimental. Since it's Cybersecurity Awareness Month and phishing e-mails are one of the top causes of attacks, we created this simple guide to help you and your team successfully identify phishing e-mails and understand why it's so important to do so. What can happen? Here are 4 significant dangers associated with phishing attacks: 1. Data Breaches Phishing attacks can expose your organization's sensitive information to cybercriminals. Once your data is exposed, hackers can sell it on the dark web or hold it for ransom, demanding thousands, millions or even more for its return - and they likely won't return it anyway. This can result in financial and legal repercussions, damage to your reputation and loss of customer trust. 2. Financial Loss Cybercriminals often use phishing e-mails to steal money directly from businesses. Whether it's through fraudulent invoices or unauthorized transactions, falling victim to phishing can have a direct impact on your bottom line. 3. Malware Infections Phishing e-mails can contain malicious attachments or links that, when clicked, can infect your systems with malware. This can disrupt your operations, lead to data loss and require costly remediation efforts. 4. Compromised Accounts When employees fall for phishing scams, their accounts can be compromised. Attackers can then use these accounts to launch further attacks or gain unauthorized access to sensitive company data. And the list goes on. However, there are actions you can take to prevent becoming the next victim of a phishing attack. Here is the S.E.C.U.R.E. Method you and your employees can use to help identify phishing e-mails  S - Start With The Subject Line: Is it odd? (e.g., "FWD: FWD: FWD: review immediately") E - Examine The E-mail Address: Do you recognize the person? Is the e-mail address unusual? (e.g., spelled differently) or unknown (not the one they usually send from)? C - Consider The Greeting: Is the salutation unusual or generic? (e.g., "Hello Ma'am!") U - Unpack The Message: Is there extreme urgency to get you to click a link or download an attachment or act on a too-good-to-be-true offer? R - Review For Errors: Are there grammatical mistakes or odd misspellings? E - Evaluate Links And Attachments: Hover over links before you click them to check the address, and do not open attachments from anyone you don't know or weren't expecting to receive mail from. It's also important to have a cybersecurity expert monitor your network and eliminate e-mail spam before your employees can make a mistake. Make sure you're taking proper precautions to protect your network. These phishing attacks work and happen all the time. We don't want YOU to be the next victim. If you need help training your team on cybersecurity best practices or implementing a robust cybersecurity system, or just want a second set of eyes to examine what you currently have in place and assess if there are any vulnerabilities, we are ready to help. Call us at (207) 300-2300 or click here to book a call with our team.
By Justin Donnaruma October 30, 2024
National Public Data confirmed in September 2024 that a hacker has compromised the personal records of millions of individuals. The information exposed includes the names, e-mail addresses, mailing addresses, phone numbers and even Social Security numbers of up to 2.9 billion people. Here's what you need to know. What happened? National Public Data, a consumer data broker that specializes in providing criminal records, background checks and other forms of data to private investigators, consumer public record sites, human resources, staffing agencies, the government and more, was hacked. The incident is believed to have started in December 2023 when a third-party bad actor attempted to gain access. In April, a cybercriminal named "USDoD" posted the stolen data online in a popular criminal community. On August 6, the stolen dataset resurfaced, this time posted for free to several breach forums for anyone to access and download. The sensitive, personally identifiable information released included names, addresses, phone numbers, e-mail addresses and Social Security numbers for millions of people, some of whom are deceased. The data also contained previous addresses and, in some instances, alternate names. The official data breach notice that was filed in Maine indicated that 1.3 million records may have been breached; however, some lawsuits are suggesting as many as 2.9 billion records have been exposed. As the investigation continues, many cyber experts are finding that some of the data released was inaccurate, and aside from the Social Security numbers, most of it is already public and easy to find online. So why is this breach dangerous if the information can be found with a quick Google search? There are several reasons to be concerned. Having all this critical information in one place makes it easy for criminals to use the information needed to apply for credit cards and loans or open new bank accounts. The information included, such as childhood street names or the last four digits of your Social Security number, are often answers to security questions and can help hackers bypass authentication and access your private accounts. Some cyber experts are suggesting watching for a surge in phishing and smishing (phishing over SMS) attacks as well. Can you be affected even if you've never heard of National Public Data or purchased data from them? Yes! Just because you haven't interacted with them doesn't mean other organizations, businesses, landlords, etc., haven't leveraged their resources to dig up information on you. What should you do to protect yourself? Step 1: Check to see if your data has been exposed. You can use tools like https://npd.pentester.com/ to find out if your information has been compromised. If so, it's important to take immediate action. Step 2: Request a copy of your credit report and then freeze your credit. One of the best ways to protect your identity is to freeze your credit and set up alerts. This prevents criminals from opening up new lines of credit in your name. To do this, contact all three major credit bureaus - Equifax, TransUnion and Experian - and request a freeze. The process is free and should take you less than 10 minutes per site to complete. If there are others in your house over the age of 18, it's a good idea to freeze their credit too. Anyone with a Social Security number is vulnerable following a breach of this size. Once you have a copy of your free credit report, review it for anything that you didn't authorize. Don't forget to set up alerts and review your credit regularly. Step 3: Watch out for phishing scams. As mentioned, many cybercriminals will try to leverage this information to scam you through phone calls, text messages, e-mails and even social media sites. Be cautious! A data breach is devastating for everyone involved - the business hacked and the customers or employees whose data is leaked. As a business owner, it is your responsibility to make sure you are taking the highest precautions to protect your business and its data. If you want to do a full assessment and find out if any of your information has been leaked or if your network is vulnerable to a breach, we'll do a FREE Security Risk Assessment. This deep dive into your network will provide you with a blueprint for security steps to take. To book yours, call our office at (207) 300-2300 or click here .
By Justin Donnaruma October 23, 2024
Software updates can feel like a nuisance, but skipping them is one of the easiest ways to leave your systems vulnerable to cyber-attacks. Hackers are constantly looking for weaknesses, and outdated software is like an open door to your network. But how do you know when it's time to update, and should you always trust your computer to tell you? Here are five clear signs it's time to update, plus tips on how to handle updates safely. 1. Your Software Is No Longer Supported If the software provider has stopped releasing updates for your current version, it's a major red flag. Unsupported software often has known vulnerabilities that cybercriminals can easily exploit. Check for announcements from your software providers about end-of-life support and upgrade as soon as possible. Tip: Don't wait for the software to "break" before updating. Plan ahead and migrate to newer versions while you still have full support. 2. You Notice Slower Performance A sudden slowdown in your software's performance can be a sign that it's out-of-date. Newer versions of software are optimized to run more efficiently, and skipping updates might leave you with buggy, sluggish software. Tip: If you notice performance drops, check the settings for pending updates or visit the provider's website to manually download the latest version. 3. You Receive Security Alerts Has your antivirus or security software flagged vulnerabilities in an application you use? If so, an update is likely overdue. Cybercriminals thrive on exploiting security gaps in outdated software. Always pay attention to security alerts and take them seriously. Tip: Use a trusted antivirus tool that can integrate with your software and alert you when updates are needed. Make sure you verify the authenticity of any update alerts before clicking. 4. You Haven't Updated In Over 6 Months If it's been more than six months since your last software update, you're probably due for one. Many providers release updates on a regular schedule to patch vulnerabilities and enhance features. Tip: Set a reminder to check for updates regularly, rather than waiting for the computer to alert you. This is especially important for critical software, like operating systems and antivirus programs. 5. New Features Have Been Announced Sometimes updates come with more than just security patches - they also bring new features. If you hear about exciting new functionality that you don't have, it's a sign you're behind on updates. Tip: Keep an eye on announcements from your software providers. Follow their blogs or sign up for notifications so you're always aware of improvements. How To Update Safely While updating software is crucial, you should always be cautious about how you do it. Here's how to ensure your updates are safe: - Verify The Source: Always download updates directly from the provider's official website or trusted app store. Avoid third-party sites or suspicious links. - Back Up Your Data: Before any major update, back up important data to an external location. This ensures that if something goes wrong, you won't lose critical files. - Restart Your Device: Once the update is complete, restart your computer to ensure that the new features and patches are properly installed. By staying on top of software updates, you're not only improving performance but also protecting your systems from potential threats. Don't wait until it's too late - keep your software up-to-date and ensure your network stays secure. Need help managing your software updates? Call us at (207) 300-2300 or click here to schedule a consultation.
Show More