The new year is all set to see a spurt in the growth of connected devices. Digital transactions too are on the raise as the government is pitching for it post demonetisation. Cyber security experts, however, warn of increased cyber threats. They feel that the attacks will go sharper, efficient and organised this year, requiring special focus to secure themselves from such attacks.
Ransomware, the biggest challenge in 2016, will not only continue to pose a major threat this year but may turn more virulent as hackers become more organised. Experts warn that enterprises and consumers are at equal risk as advanced criminal attack groups now acquire the skillsets of nation-state attackers.
Govind Rammurthy, Managing Director and Chief Executive Officer of Internet security solutions company eScan, foresees increase in ransomware (taking over the computers of the users to demand ransom money to release the data) attacks. “The attackers could use more stealth methods to launch ransom attacks. They could even turn Internet of Things products as bots (servants) to launch attacks,” he points out.
Digital drive“The recent (digital) drive in India which gave momentum to the growth of digital wallets and digital vaults. These can become targets of various malware as well as hacks to steal money,” he said.
“As businesses define their strategies for digital transformation in this new year, fileless malware, drone-jacking, increased DDoS (Distributed Denial of Service) attacks and hacking of connected cars will be some of the prevalent trends and threats which they would have to prepare for,” Tarun Kaura, Director (Solutions Product Management of Asia-Pacific and Japan of - APJ) of Symantec, said
He points out that hackers adopting “corporate best practices and establishing professional businesses” to increase efficiency of their attacks. With the increasing flow of data from smart devices, apps and other online services, businesses and consumers have to be more vigilant regarding their security, he felt.
“They will need to shift their focus from safeguarding endpoint devices towards protecting users and information across all applications and services. The need of the hour is to create a strong framework of policies and regulations to secure the internet enabled infrastructure of government, organisation, household and even individuals,” Kaura said.
Comments
Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.
We have migrated to a new commenting platform. If you are already a registered user of TheHindu Businessline and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.