Cybersecurity Trends to Expect in 2021

As COVID-19 caused havoc on many industries worldwide in 2020, cybersecurity becomes another issue facing businesses. We are living in an era when cybersecurity trends are part of technological advancement. Now that we are in 2021, our reliance on technology is still on; hence, our network's threat still exists. The COVID-19 pandemic is forcing workers to social distance themselves; thus, they are hyper-connecting through technology. Business operations are currently going on through technological platforms. Some workers are even working remotely but still connect to their businesses through various internet communication channels.

The new norm of remote working has posed a threat to workers through cyber threats, especially for those working remotely. The following are the myriad cyber trends likely to be experienced by various organizations and their remote employees:

1. Ransomware threats.

Ransomware threats are rising in the form of cyber-extortion. While not new this cybersecurity trend allows attackers to send malware to a company's systems to lock them out and demand ransoms. It is even becoming hard for tracing attackers using cryptocurrency as a payment form. No legal authority controls cryptocurrency. Some of the remote employees have been ignorant, leaving their systems exposed to attackers. As we go through 2021, remote employees and organizations must be extra careful and protect their networks from ransom attacks.

2. Privacy and cybersecurity threats within the Internet of Things (IoT).

Many organizations are gradually adopting the Internet of Things (IoT) by connecting all their gadgets to the internet. IoT interconnects devices, software, and sensors to all company devices via the internet. Thanks to numerous technologies such as real-time analytics, home, and building automation, control systems, wireless sensor systems, machine learning, and embedded systems, businesses are connecting to the IoT. However, companies will be facing cyber threats and privacy breaches. Companies should guard their networks against malware infiltration into their systems.

3. Business Email Compromise (BEC).

As businesses rely on emails as their primary communication channel, they expose themselves to attacks through Business Email Compromise (BEC). Email compromise occurs when attackers send emails appearing to come from legitimate sources, especially suppliers. The attackers use the email to send invoices and request payments through updated email addresses. Professionals, therefore, need to be more vigilant not to be conned by attackers.

Though the advancing technology and pandemic have brought challenges, there is a lot to be learned by business people. Technology will keep on advancing as days go. However, we expect companies to adopt any new advancements to make them profitable and ease business operations.

If you have any burning questions about your cybersecurity measures and want to see how they stack up to the threats of today, we're more than happy to schedule a cyber security audit for FREE. Get in touch with us to learn more

How Amazon Sidewalk is Complicating Network Security

If you use a certain Echo or Ring device, do you know that it could be sharing your network bandwidth and data with other users right now?

A brand-new concept in shared public networks has been launched by Amazon to extend the capabilities of its IoT devices. It’s being done by taking bandwidth from networks of compatible devices and sharing them in a “community pool.”

This new low-bandwidth neighborhood network is called Amazon Sidewalk, and it has many cybersecurity experts concerned about potential security problems.

IoT devices themselves are already known to be one of the larger security threats when it comes to network endpoints. In the 2020 Unit 42 IoT Threat Report, it was found that 57% of IoT devices are vulnerable to medium or high-security attacks. 

Now imagine those IoT devices deciding to share your network with strangers on their own. That’s what Amazon Sidewalk does.

What is Amazon Sidewalk?

At the end of December 2020, owners of select Echo Devices and Ring security cameras began being opted into a new network called Amazon Sidewalk. This was an automatic opt-in, without users doing anything.

Amazon Sidewalk is a new shared network with the goal of extending internet connectivity to certain smart devices past the reach of a typical home or building Wi-Fi.

Benefits touted for the network are:

The Sidewalk Network is powered through what Amazon refers to as Sidewalk Bridges. These are basically devices that can connect to the network (Echo, Ring devices, etc.).

Sidewalk works by:

Amazon Sidewalk Security Concerns

Shared Networks Are Often Hacked

Publicly shared networks are prime targets for hackers. Even with the 3-layer encryption that Amazon is using for Sidewalk, there is still a big chance of a breach.

Because this concept at this scale is so new, it’s not yet known if a breach would result in a breach of participating user networks, the data they’re sharing through the Sidewalk network, or both.

Remote Employees Can Put Data at Risk Without Realizing It

Since the pandemic, many businesses in Houston and around the country are using more remote employees than in the past. In 2021, the number of permanent remote employees is expected to double.

Even with good employee cybersecurity awareness, if someone has an Echo voice speaker anywhere in their home, it could leave a big security vulnerability without them realizing it because of the automatic opt-in. 

Voice assistants like Echo Dot, Echo Dot for Kids, Echo Show, and others have been exploding in popularity, both in homes and offices. So, there’s a good chance that at least one Sidewalk Bridge device would be present somewhere on a network being used for your business data.

Third-Party Developers Are Being Invited to Join

When you’re dealing only with Amazon devices, that’s one level of security risk. But when you have multiple third-party developers adding Sidewalk connectivity to their devices, that’s a whole new level of risk.

Currently, the only devices that can connect to Sidewalk are select Echo and Ring devices, but Amazon is inviting third-party developers to add Sidewalk Bridge capabilities to their products.

For those that like the idea of the network, this expands how many devices you can use on it. However, those in IT security know that the more developers, the more risk there is of a code vulnerability.

Users Can Give the General Vicinity of Their Device

One feature that is designed to make it easier for those looking to connect to an available Amazon Sidewalk network is to allow people to see the general vicinity of a Sidewalk Bridge device.

This feature also makes it easier for hackers to find networks to target.

How To Disable Sidewalk Connectivity

For those wishing to turn off the connection to Amazon Sidewalk, here are the steps:

Amazon notes that turning off your device’s (and network’s) participation in Amazon Sidewalk will not impact the performance of the device.

Get an IoT Device Security Review from Digital Crisis

IoT devices are becoming a larger part of both in-office and remote work networks. Digital Crisis can help your Houston area business ensure yours are properly secured. 

Contact us today to schedule a consultation. Call 713-965-7200 or reach us online.

<div class="engage-hub-form-embed" id="eh_form_6465195693047808" data-id="6465195693047808"> </div>