Share with your friends










Submit

Analytics Magazine

Accenture security report identifies top cyber threats

With recent large-scale cyberattacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, reveals how threat actors are continuing to evolve their ability to avoid detection. Based on in-depth analysis, the report anticipates a growth in the number of threat actors who are rapidly expanding their capabilities due to factors such as the proliferation of affordable, customizable and accessible tools and exploits.

The 2017 Cyber Threatscape Report examines key trends during the first half of 2017 and explores how cyber incidents may evolve over the next six months. The report relies on iDefense intelligence collection, research and analysis including research using primary and secondary open-source materials. It covers the increased prevalence of destructive attacks and adversary denial and deception tactics; the aggressive use of information operations by nation-states; growth in the numbers and diversity of threat actors; as well as the greater availability of exploits, tools, encryption and anonymous payment systems available to malicious actors.

“The first six months of 2017 have seen an evolution of ransomware producing more viral variants unleashed by potential state-sponsored actors and cybercriminals. Our findings confirm that a new bar has been set for cybersecurity teams across all industries to defend their assets in the coming months,” says Josh Ray, managing director at Accenture Security. “While the occurrence of new cyberattack methods is not going away, there are immediate actions companies can take to better protect themselves against malicious ransomware and reduce the impact of security breaches.”
Other notable observations from the report include:

Reverse deception tactics. Increasing cybercriminal use of deception tactics including anti-analysis code, steganography and expendable command-and-control servers used for concealment of stolen data. Greater public reporting on cyber threat activity and attribution may accelerate this denial and deception trend, increasing the cost of cyber defense efforts and resource allocations.

Sophisticated phishing campaigns. Cybercriminals continue to craft familiar lures – subject lines mentioning invoices, shipping, resumes, wire transfers, missed payments – but ransomware is displacing banking trojans as one of the most prevalent types of malware delivered via phishing techniques.

Strategic use of information operations. Escalation of espionage and disruption activity from state-sponsored actors may likely continue in response to fulfilling strategic collection requirements and geopolitical triggers such as economic sanctions, military exercises and religious conflicts.

Alternative crypto-currencies. Bitcoin continues to be the currency of choice among cybercriminals. However, the need to better conceal transactions is forcing cybercriminals to either develop and leverage bitcoin laundering techniques or adopt alternative cryptocurrencies.

DDoS-for-hire services. Distributed denial of service (DDoS)-for-hire services have given way to a thriving DDoS-for-hire botnet ecosystem leading to threat actors gaining greater access to increasingly potent and affordable DDoS-for-hire tools and services.

Effective components for a business continuity plan include:

Adopt proactive prevention. Recognize phishing scams through prevention training and awareness programs. Make it easy for employees to report fraudulent emails quickly, and keep testing internally to prove the training is working.

Elevate e-mail controls. Maintain strong spam filters and authentication. Scan incoming and outgoing e-mails to detect threats and filter executable files. Consider a cloud-based e-mail analytics solution.

Insulate your infrastructure. Remove or limit local workstation administration rights or seek out the right configuration combinations (e.g., virus scanners, firewalls). Regularly patch operating systems and applications.

Plan for continuity. To avoid paying any ransom have a strong cyber resilience plan for recovery that is regularly reviewed, updated and tested.

 

Related Posts

  • 38
    A recent report by Scrutinise Research and Analysis finds that immediate action is required to avert potentially disastrous security breaches of connected devices by cyber terrorists and criminals in the current “Wild West” of the Internet of Things (IoT). The report, “Securing the Internet of Things,” recommends a four-pronged approach…
    Tags: security, report, cyber
  • 30
    The Golden State Warriors, GSW Arena LLC and Accenture recently announced a multi-year partnership to reinvent the fan and community experience at Chase Center and the surrounding district. Accenture will begin its relationship with the Warriors this season at Oracle Arena in Oakland, Calif. Accenture will also be a founding…
    Tags: accenture, business


Headlines

Meet CIMON, the first AI-powered astronaut assistant

CIMON, the world’s first artificial intelligence-enabled astronaut assistant, made its debut aboard the International Space Station. The ISS’s newest crew member, developed and built in Germany, was called into action on Nov. 15 with the command, “Wake up, CIMON!,” by German ESA astronaut Alexander Gerst, who has been living and working on the ISS since June 8. Read more →

Yale research on immigration, aging runners makes news

A recent study by Yale University professor and former INFORMS President Edward H. Kaplan (photo) and Yale colleague Jonathan Feinstein and Mohammad M. Fazel-Zarandi of MIT suggests that the number of undocumented immigrants in the United States is nearly twice as many as experts previously thought. Since its publication last month, the study, which estimates the number of such immigrants at 22.1 million instead of 11.3 million, has garnered worldwide attention from major media outlets including the Los Angeles Times, the Boston Globe, Fox News, Bloomberg News and the Daily Mail. Read more →

New salary survey paints optimistic picture for analytics professionals

Harnham, a global leader in data and analytics recruitment, recently released the 2018 editions of its salary guides for the United Kingdom, the United States and Europe. Having heard from thousands of data and analytics professionals across the globe, Harnham has gained an invaluable insight into key industry salaries and trends across a wide variety of analytics specialties and sectors. Read more →

UPCOMING ANALYTICS EVENTS

INFORMS-SPONSORED EVENTS

Winter Simulation Conference
Dec. 9-12, 2018, Gothenburg, Sweden

INFORMS Computing Society Conference
Jan. 6-8, 2019; Knoxville, Tenn.

INFORMS Conference on Business Analytics & Operations Research
April 14-16, 2019; Austin, Texas

INFORMS International Conference
June 9-12, 2019; Cancun, Mexico

INFORMS Marketing Science Conference
June 20-22; Rome, Italy

INFORMS Applied Probability Conference
July 2-4, 2019; Brisbane, Australia

INFORMS Healthcare Conference
July 27-29, 2019; Boston, Mass.

2019 INFORMS Annual Meeting
Oct. 20-23, 2019; Seattle, Wash.

Winter Simulation Conference
Dec. 8-11, 2019: National Harbor, Md.

OTHER EVENTS

Applied AI & Machine Learning | Comprehensive
Dec. 3, 2018 (live online)


Advancing the Analytics-Driven Organization
Jan. 28–31, 2019, 1 p.m.– 5 p.m. (live online)

CAP® EXAM SCHEDULE

CAP® Exam computer-based testing sites are available in 700 locations worldwide. Take the exam close to home and on your schedule:


 
For more information, go to 
https://www.certifiedanalytics.org.