By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Expect cyber attacks on supply chains: Eset
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Expect cyber attacks on supply chains: Eset
EnterpriseInternet

Expect cyber attacks on supply chains: Eset

Grace Chng
Last updated: February 9, 2018 at 6:50 PM
Grace Chng
Published: February 9, 2018
4 Min Read
PHOTO: Pixabay (Creative Commons)

The one certainty this year has been the unabated flow of cyber attacks.

According to Hackmageddon, which collects infosecurity statistics, there have been 50 such attacks between Jan 1 and 15 2018, compared to 38 in the same period last year.

Depending on which security site, vendor or research one reads, the point is not the number of attacks, but that the attack trend is only going  up, up and up.

Clearly chief security officers in 2018 will have to step up with their network protection and malware prevention and detection activities. They should be looking out for ransomware attacks which will be more pronounced this year.

More attacks year can also be expected on the Internet of Things, as millions of devices get connected together. Systems surrounding crypto currencies and blockchains will also not be spared.

At risk too are supply chains of large companies, said Roman Kovac, chief research officer of security firm Eset.

“The chain is as strong as its weakest link. Attackers are trying to use the weakest element in the organisation’s supply network to infiltrate larger companies,” he explained.

Smaller companies which populate the supply chains, he said, usually have rudimentary online security measures which can be easily breached, giving attackers a chance to use them as a conduit to the networks of larger companies where there are more valuable digital assets to steal like personal details of consumers.

There are no simple solutions to this challenge.  What is important, he said, is that organisations must “monitor their suppliers and software” so that they are more aware of their risks.

Another way attackers can breach security is through new vulnerabilities made public by whistle blowers who have had illegal access to top secret files from organisations like the National Security Agency of the United States.

These vulnerabilities highlight weaknesses or tools that can be exploited or used to gain access to confidential information or important networks.

Eset’s malware detection engineers are testing thousands of samples of information which can be software, executable files, Web links or different types of data sets, then classifying them into malicious and clean or harmless files. Protection against new forms of malware are designed and then shared with its customers, said Kovac.

Other researchers in Eset’s laboratory look at the entire attack process to understand how a malware launches the attack, how the malware was created, distributed, its targets and how the stolen information is used.

Lessons gleaned from this process allow Eset to understand better new cyber threats which can be shared with industry partners and customers.

Kovac’s advice to companies is that there is no simple solution to cyber threats. Staying vigilant is important but equally crucial is that organisations must be ready with remedial action when they are attacked so that they can recover quickly to prevent greater information or revenue loss.

 

Trial of smart Philips lighting could help shoppers navigate a Singapore mall
Cyber security from ground-up
Cybersecurity should be built into your network
Google wants to help you find what you love
Experts: regulation needed to secure Internet of Things
TAGGED:cyber attackscyber securityEset

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByGrace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article Goondu review: B&O Play Beoplay H9i sounds refined, has excellent noise cancellation
Next Article iOS 11.3.2 public beta has battery health feature
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Proofpoint pitches human-centric cyber defence against AI-generated phishing
Cybersecurity Enterprise Software
June 16, 2025
Q&A: Focus on measurable AI cases, not moonshot goals, says Hitachi Vantara
Enterprise
June 16, 2025
Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Follow Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?