Menu

IoT FEATURE NEWS

IoT Predictions 2017: Frost & Sullivan on Cyber Security in Asia

By

Cyber security received heightened interest in 2016 due to a spate of cyber attacks, including on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), $81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yahoo data incidents.

As more industries become increasingly connected to the Internet due to the Internet of Things, it is more essential than ever to consider preparing for IoT security in 2017. Frost & Sullivan’s Asia Pacific Cyber Security practice analysts have shared the following cyber security predictions for 2017.


1. Business Email Compromise (BEC) attacks will overtake Ransomware and Advanced Persistent Threat (APT) attacks

BEC generally happens when email accounts of key executives are compromised and involves payments made to fraudulent bank accounts. There was a 20 percent increase in number of such cases as compared to the same period last year, according to Frost & Sullivan. Police investigations revealed that the scam usually involves businesses with overseas dealings with email as the main form of communication in the dealings.


2. DDoS attacks might cause the Internet to be down for an entire day in a country

Globally, Distributed Denial of Service (DDoS) volumetric attacks hit over 1 Tbps of traffic and shut down several popular online services in 2016. While government authorities attempt to implement strict security regulations, manufacturers are still delivering insecure IoT devices to the market. This, and the fact that internal volumetric attacks to DNS servers for service providers are not well defended, cyber attackers will most likely attempt to exploit the vulnerability to the next level and bring down the internet in a country for at least a day, the analysts said.
 

3. Greater enforcement expected for IoT devices to meet cyber security standards

As authorities become increasingly concerned about the threats unsecured IoT devices will pose to the community, it will be illegal for these manufacturers to sell their products in countries that demand these devices comply with security standards. The recent Mirai botnets exploiting the vulnerabilities of IP cameras are an example of how manufacturers did not include a security process of changing default passwords when connecting the devices to the Internet.

4. The healthcare sector will have more stringent regulations for critical operations

Globally, ransomware attacks on computer systems of healthcare providers in 2016 had infected computer systems and disrupted operations hence patients in need of immediate attention had to be diverted to other hospitals. While major healthcare providers in Asia had initiatives to comply with security standards such as HIPAA, their use of legacy security tools to meet minimal compliance standards could not keep up with the new types of cyber attacks. Stolen personal healthcare records are worth more in the dark web than credit card information and medical machines are increasingly connected to the Internet which pose as a possible safety risk to patients.

5. New technologies used to enhance trust and exchange threat intelligence among industries

The setup of more Information Sharing and Analysis Centers will form platforms for both the private and private sector participants to share threat intelligence. However, participants are wary of exposing their weak security posture when contributing intelligence due to a successful attack. Blockchain may emerge as the technology to facilitate the exchange as it authenticates the trusted party to contribute, obfuscates the contributor's detail with anonymity, and offers a tamper proof system that prevents unauthorized alteration of any data shared.


6. More adoption of technologies that focus on threat actors and finding next attacks

Traditionally, enterprise security teams have adopted a “wait and see” posture, and try to build up their defenses to mitigate the known threats. However, more enterprises are working towards trying to know what the attackers are innovating in terms of cyber attack techniques, their next moves, and build up their defenses to counter the new attack vectors.

7. More enterprises will offer bug bounty programs

The idea is simple yet effective: pay the attackers for finding and reporting major vulnerabilities in enterprise and/or developed applications. Enterprises will be able to strengthen their security defenses through the crowdsourcing model and encouraging potential hackers to discover more and do more of the good rather than the bad.

8. More drones will be used to facilitate cyber attacks

A group of researchers from iTrust, a Center for Research in Cyber Security at the Singapore University of Technology and Design, demonstrated that it is possible to launch a cyber attack using a drone and a smartphone.  In the future, it is expected that drones will be an easy way to scan for unsecured wireless traffic as a way of performing war driving attacks.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

LTIMindtree and Vodafone Partner for Smart IoT Solutions

By: Stefania Viscusi    4/25/2024

LTIMindtree announced a collaboration with Vodafone aimed at delivering connected and smart IoT solutions to drive Industry X.0 and digital transforma…

Read More

Securing Reliability in IoT: Memfault Highlights a Lack of Proactive Measures

By: Alex Passett    4/25/2024

New data released from IoT reliability platform Memfault just earlier this morning highlights the importance of proactivity when engineering IoT solut…

Read More

Spur Measurable IoT Growth through Viasat's ELEVATE Program - Registration for its ELEVATE Global Partner Event is Now Open!

By: Alex Passett    4/25/2024

Viasat's ELEVATE global partner event is right around the corner. From June 18-19 in Carlsbad, California, those interested in satIoT connectivity sol…

Read More

Assessing IoT Innovator LTIMindtree: Its 2023-24 Successes to Date and a Peek at What's Next

By: Alex Passett    4/24/2024

IoT Evolution World has presented a brief rundown of LTIMindtree's successes during FY24, as well as a peek at what's to come for the Internet of Thin…

Read More

Powering Adaptability in IoT: Telit Cinterion Reveals its First High-Precision GNSS Module

By: Alex Passett    4/22/2024

Telit Cinterion announced the launch of its SE868K5-RTK module, a high-precision Global Navigation Satellite System (GNSS) receiver capable of centime…

Read More