By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Expect cyber attacks on supply chains: Eset
Share
Aa
TechgoonduTechgoondu
Aa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Expect cyber attacks on supply chains: Eset
EnterpriseInternet

Expect cyber attacks on supply chains: Eset

Grace Chng
Last updated: February 9, 2018 at 6:50 PM
Grace Chng Published February 9, 2018
4 Min Read
SHARE
PHOTO: Pixabay (Creative Commons)

The one certainty this year has been the unabated flow of cyber attacks.

According to Hackmageddon, which collects infosecurity statistics, there have been 50 such attacks between Jan 1 and 15 2018, compared to 38 in the same period last year.

Depending on which security site, vendor or research one reads, the point is not the number of attacks, but that the attack trend is only going  up, up and up.

Clearly chief security officers in 2018 will have to step up with their network protection and malware prevention and detection activities. They should be looking out for ransomware attacks which will be more pronounced this year.

More attacks year can also be expected on the Internet of Things, as millions of devices get connected together. Systems surrounding crypto currencies and blockchains will also not be spared.

At risk too are supply chains of large companies, said Roman Kovac, chief research officer of security firm Eset.

“The chain is as strong as its weakest link. Attackers are trying to use the weakest element in the organisation’s supply network to infiltrate larger companies,” he explained.

Smaller companies which populate the supply chains, he said, usually have rudimentary online security measures which can be easily breached, giving attackers a chance to use them as a conduit to the networks of larger companies where there are more valuable digital assets to steal like personal details of consumers.

There are no simple solutions to this challenge.  What is important, he said, is that organisations must “monitor their suppliers and software” so that they are more aware of their risks.

Another way attackers can breach security is through new vulnerabilities made public by whistle blowers who have had illegal access to top secret files from organisations like the National Security Agency of the United States.

These vulnerabilities highlight weaknesses or tools that can be exploited or used to gain access to confidential information or important networks.

Eset’s malware detection engineers are testing thousands of samples of information which can be software, executable files, Web links or different types of data sets, then classifying them into malicious and clean or harmless files. Protection against new forms of malware are designed and then shared with its customers, said Kovac.

Other researchers in Eset’s laboratory look at the entire attack process to understand how a malware launches the attack, how the malware was created, distributed, its targets and how the stolen information is used.

Lessons gleaned from this process allow Eset to understand better new cyber threats which can be shared with industry partners and customers.

Kovac’s advice to companies is that there is no simple solution to cyber threats. Staying vigilant is important but equally crucial is that organisations must be ready with remedial action when they are attacked so that they can recover quickly to prevent greater information or revenue loss.

 

You Might Also Like

As TikTok faces a possible ban in the US, should users elsewhere be worried?

Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage

RedCap: A new cellular IoT technology for the 5G era

Q&A: Delivering movies digitally and securely from around the world

In remote Taiwan, firefighters use a 5G base station “in a box” when responding to emergencies

TAGGED: cyber attacks, cyber security, Eset

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Grace Chng February 9, 2018
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Copy Link Print
Share
Avatar photo
By Grace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article Goondu review: B&O Play Beoplay H9i sounds refined, has excellent noise cancellation
Next Article iOS 11.3.2 public beta has battery health feature
Leave a comment

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

Facebook Like
Twitter Follow

Latest News

As TikTok faces a possible ban in the US, should users elsewhere be worried?
Cybersecurity Internet March 24, 2023
Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage
Enterprise Internet March 23, 2023
RedCap: A new cellular IoT technology for the 5G era
Enterprise Software Telecom March 23, 2023
Sony Playstation VR2 review: An immersive experience awaits
Gaming March 21, 2023
//

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
Follow US

© 2023 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact

Join Us!

Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Lost your password?