Adopt proactive cyber defense strategy in the post-pandemic era
The recent reopening of Hong Kong-Mainland cross-border and neighboring Asian countries accelerated the recovery of economy and led digital transformation across different industry verticals. With the aim of providing excellent user experience and business continuity, significant investments were made in technologies.
With the border reopening, increasing demand for business and personal travel is expected. Retail and real estate also benefits from the relax of social distancing measures. To catch the business opportunities, organizations are in actions of launching new services and products online, such as air-plane tickets and hotel accommodation packages, etc.
The digital transformation of businesses is continuously expanding the attack surface, including IoT/OT devices, online services, cloud workloads and more available to bad actors. While technology has made it easier for businesses in the new normal, it has also presented hackers and malicious actors with an unprecedented opportunity to take advantages exponentially.
Risks and Challenges for organizations
Limited visibility to the expanding attack surface: Criminals may take advantages of the expanding attack surface of organizations as the doors to gain access to the network of organizations. In addition, criminals also trade the data obtained from phishing, compromised devices or user accounts on the dark web.
The Rise of Advanced Persistent Cybercrime, including Ransomware: FortiGuard Labs team documented 10,666 new ransomware variants in 1H 2022 compared to just 5,400 in 2H 2021. The growth of Criminal-as-a-Service (CaaS) contributes to an increased volume of cyber-attacks. Threat actors also dramatically reduce the time in attack preparation through subscription models.
Hard to detect intrusion, impersonation, and data breach: Criminals often use fake websites and social media pages to phish customers, business partners, and employees of the victim organizations. That makes detecting intrusion difficult—the longer time to spot an intruder, the more significant the financial impact of data breach costs. With stolen user credentials and sensitive data, such as credit card numbers and personal identification info, threat actors can easily cover themselves from detection of traditional security countermeasures.
Skill shortage and employee negligence: While the cyber threat landscape is evolving, cyber-attacks become more sophisticated to be detected. The ongoing emigration wave further enlarges the gap of IT security skill shortage in many organizations. Organizations with limited staffs and resources may need tools providing better visibility and automation for threat detection and investigation, before burning out the IT security operations.
Recent Examples:
For instance, in 2022, a bad actor impersonated a top-tier local hotel group's Facebook page to market staycation packages in Hong Kong using a fake Facebook account. This impacted the company's revenue and brand reputation. In another instance, a hotel chain revealed a data breach affecting the personal data of more than 290,000 visitors in 2022. However, the hotel chain first became aware of the questionable activity only two months after the malicious actor gained the network access.
What's needed?
Organizations need to rethink their strategy to fortify their security architectures. To provide effective defenses against sophisticated attacks, they should look at strategic partners and solutions, such as External Attack Surface Management (EASM) and digital risk protection (DSP) for brand protection and dark web monitoring, cyber deception, Network Detection & Response (NDR), and Endpoint Detection & Response (EDR) – those are capable of taking proactive remedial action before threat actors engage in harmful behavior.
Finally, for organizations to maximize the return on their digital investments, secure their data, and allow privacy compliance, it is crucial to have the proper strategic technology partner.
-- Contact us at [email protected]
-
Integration of GIS and BIM can drive development of smart city Dr. Winnie Tang
The China Association for Geospatial Industry and Sciences (“the CAGIS”) released the Top Ten Highlights of China's Geographic Information Industry in 2023, which provides much inspiration. The
-
Equip young people for the future Dr. Winnie Tang
In late February, the inaugural flight of an air taxi from Shenzhen Shekou Cruise Homeport to Zhuhai Jiuzhou Port took only 20 minutes with an estimated one-way ticket price of 200 to 300 yuan per
-
Are we raising a generation of leaders, or of followers? Brian YS Wong
The essence of education is defined not by the facts it imparts, but the potential knowledge it inspires students to individually pursue on their own. Put it this way – the ideal form of education
-
The urgent need for reforms to sex education in Hong Kong Sharon Chau
Nearly one in every four university students (23%) in Hong Kong has been sexually harassed, according to a 2019 report published by the Equal Opportunities Commission (EOC). A 2019 study found that
-
STEAM should be linked to real life Dr. Winnie Tang
In the 2017 Policy Address, STEM (science, technology, engineering and mathematics) education was proposed as one of the eight major directions to promote I&T development. Since then, funding has
-
Russia’s nightmare – loss of Far East
-
首屆「中華文化節」六月開幕 感受中華傳統文化多元魅力
-
養顏即食花膠靚湯
-
My Brief Remarks – at the HKS China Conference
-
呈獻精彩絕倫的音樂盛會
-
非凡彩寶之旅 Winston Candy & Winston Kaleidoscope系列
-
The perils of self-censorship
-
中華文化節2024系列~八台戲曲亮相中華文化節 新編粤劇《大鼻子情聖》打響頭鑼
-
伊藤詩織:紀錄片是改變的一部分
-
DIOR MEN Fall 2024~Effortless Chic流麗衣櫥