2021 - This is what CIOs have to pay attention to

Share post

A10 Networks provides insights into the most pressing cybersecurity problems in 2021 - This is what CIOs need to be aware of. While the analog world was kept in check by a pandemic in 2020, cybercriminal activities and attacks created additional burdens in the digital space.

Regardless of whether it is the increase in simple phishing attacks or one of the largest recorded DDoS attacks to date: 2020 was also the year in which the threat from cyber criminals grew rapidly - and this will continue in 2021. A10 Networks explains the most pressing cybersecurity challenges and what CIOs should pay particular attention to.

State institutions in the crosshairs

The developments mentioned are expected to intensify in 2021. State actors in particular were already the focus of cyber criminals last year. One reason for the rise in attacks on governments and related institutions could have been the US presidential campaign. The attack on FireEye should also be decisive for the development of the new year. Experts suspect that this attack was caused by state-commissioned cyber criminals who stole several tools in the course of the attack that could later be used to attack critical infrastructures.

“These types of attacks on government agencies will intensify in the coming year,” says Heiko Frank, Principal System Engineer at A10 Networks. “In the future, targeted espionage acts or attempted theft will also go down in the annals. In the future, this form of international cyber espionage will probably mean that providers of cybersecurity products will have to be more creative, flexible and dynamic in order not to fall behind in the development of new defense strategies. "

Downside of 5G and MEC

The implementation of Multi-Access Edge Computing (MEC) is one of the most important innovations driven by the introduction of the new 5G mobile radio standard. With the help of this technology, both access to 5G and its efficiency can be further increased. However, this progress is also associated with the risk that the intelligent edge could be hijacked by cyber criminals in order to use it for their own machinations.

This security risk is a problematic aspect of the new technology not only for mobile networks. Customers who are explicitly outside the specified area of ​​the corresponding telecommunications provider can also be affected by the consequences. The innovation around MEC, which is actually positively connoted, can be used to spread malware in various networks. For example, one potential consequence is that drones could be drawn into the suction of IoT botnets as a result.

DDoS attacks: small but dangerous

The DDoS attack on the AWS cloud service in February 2020, with up to 2,3 terabits per second, is already one of the largest recorded DDoS attacks of all time. While this attack did not go unnoticed due to its sheer bandwidth alone, cybersecurity companies were also able to note many smaller attacks in the past year.

Since it is to be expected that this trend will also intensify in 2021 and the following years, the IT security industry should prepare for it now. This is the only way to ensure that critical components of the security infrastructure do not fail. In addition, such attacks carry the risk of being used as a cover for major malware attacks.

Increasing danger from growing botnets

Heiko Frank, Principal System Engineer at A10 Network

Heiko Frank, Principal System Engineer at A10 Networks

A10 Networks' cybersecurity researchers observed over the past year that the number of available DDoS attack tools has more than doubled over the past year. This includes, for example, computers or IoT devices that have been compromised by malware or other means by hackers and can thus be misused for use in targeted attacks in botnets. While security researchers found around six million compromised devices at the end of 2019, the number was already 2020 million devices at the end of 12,5.

Since the trend towards the smart home continues and new Internet-connected IoT devices go online every day, this growth will continue in 2021. Researchers assume about five million additional devices that could be used for DDoS attacks due to security deficiencies. It is therefore only a matter of time before the next record-breaking DDoS attack will occur.

Zero Trust will be the means of choice in 2021

Due to the special situation in the past year, zero trust models have moved more into the focus of many cybersecurity officers. In order to implement the necessary guidelines, which are a prerequisite for the success of the zero trust model, many providers of software, network and hardware solutions had to deal in detail with them and the underlying objectives. Not least because of the COVID-19 pandemic, the switch to SaaS models in the workplace has been significantly accelerated. The new normality of the home office as a workplace made it necessary for zero trust models to become a new standard in many companies. For those responsible, it quickly became clear that Zero Trust is a fundamental strategic IT orientation that is based on a large number of guidelines and practice-related working methods.

"In order to successfully implement the zero trust model, IT managers should understand the inherent logic of the model and also keep track of the multitude of different solutions that are crucial for the strategy to be successful," says Heiko Frank. “In 2021, the model will be implemented by many companies due to the comprehensibility that has now been achieved and the holistic approach. Not least because of mature and complex attacks, which will continue to increase, a zero trust implementation is urgently needed. "

Strategies for the 2021 threat

While companies had to prepare for unforeseeable situations in 2020, the pandemic year allows - at least for the situation within cybersecurity - far-reaching insights into the problems to be expected that could arise in 2021. Consequences can be derived from the experience of the past year, which should definitely be considered for the future. The resulting strategies should be tailored to the respective business area and industry. Ultimately, experienced and strong partners can support those responsible in implementing essential cybersecurity measures.

More on this at A10networks.com

 


Via A10 Networks

A10 Networks (NYSE: ATEN) provides secure application services for on-premises, multi-cloud and edge-cloud environments at hyperscale speeds. The company enables service providers and companies to deliver business-critical applications that are secure, available and efficient for the transformation to multi-cloud and 5G. A10 Networks enables better business results that support investment protection, new business models and future-proof infrastructures, and enable customers to deliver a secure and accessible digital experience. A10 Networks was founded in 2004, is based in San Jose, California, and serves customers worldwide. More information is available at www.a10networks.com and @ A10Networks.


 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more

Solar energy systems – how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. trend ➡ Read more

New wave of phishing: Attackers use Adobe InDesign

There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. ➡ Read more