Cyber threats and cyberattacks are no longer novel terms in the present era. Organisations, big and small, need to take on a proactive approach towards preventing various cyber threats and implementing policies that can guarantee security in an ever-evolving digital world.

The shift from centralised computing to cloud-based services — although considered secure — has exposed security gaps vital for an organisation to identify.

The implementation of cyber security solutions that in addition to providing traditional security, supplement cloud-native solutions is essential. It is imperative to understand these threats, some of which are listed below.

1. Cryptojacking

Cryptojacking is relatively a new form of cyberattack and quite hard to determine. Mining for cryptocurrencies like Bitcoin requires computing power, and cybercriminals have found ways to access cloud computing systems using their computing power for cryptocurrency mining.

More than 34 per cent of the organisations globally are affected by insider threats yearly — it may be due to an employee going rogue but mostly it’s a result of negligence or human error

It slows down the system and the issue might seem to be a slower internet connection or an update patch and it may take very long to determine that the system has been cryptojacked

2. Data breaches

Most of the cyberattacks take place in order to steal data by attempting to gain unauthorised access to the cloud network. Besides data, which is all so important, it puts a business at risk of having stolen intellectual property, facing hefty fines by the General Data Protection Regulation and most importantly, losing the trust of its customers.

3. Denial of Service (DoS) Attack

DoS or DDoS attacks are orchestrated to bring down a server or multiple servers at the same time. Attackers flood the targeted systems with bursts of traffic so that the systems’ buffering capability exhausts, causing it to slow down and eventually shut down. Hence the services provided by the systems are attacked and become inaccessible to users resulting in a loss of business.

4. Malware

Malware is an intrusive software that cybercriminals look to inject into a computer system through phishing or network breach to steal data.

Typically, organisations are focused on preventive tools to stop network breaches. They assume that by securing the perimeter, they’ll be safe from cyberthreats. However, some advanced malwares do find their way into the networks.

It’s crucial to continuously monitor and detect malware that has breached the perimeter defence. Implementation of multi-layered protection is required to prevent malware from breaching a network.

5. Insider threats

More than 34 per cent of the organisations globally are affected by insider threats yearly. It may be due to an employee going rogue but mostly it’s a result of negligence or human error.

Proper training and understanding of cybersecurity amongst staff at all levels is vital to guarantee prevention against insider threats. Ensuring that a proper off-boarding process is in place when an employee resigns is also crucial here. Their access to company data must be restricted by the removal of login credentials.

6. Hijacking accounts

Hackers use an employee’s account as a gateway to gain access to the whole network. They use password cracking techniques and phishing emails to gain access to accounts, so it also falls under the category of insider threats.

Hijacking can be prevented by proper user accounts management. It means that every user account throughout the organisation is given access to only essential information. Therefore, if an account is compromised, data leakage is minimal. Additionally, accounts’ monitoring and regular password changes should be implemented.

7. Insecure applications

Even a highly secure network is vulnerable due to external applications. Third-party applications and services are often prone to serious cloud-security risks. Before installing certain applications, they must be tested rigorously to ensure they pose minimum risk to the network’s cybersecurity.

Staffers should also be prohibited from downloading or installing applications on their own. The IT team must approve an application before it is installed on the system. Also, the installed applications should be patched with available updates regularly.

Recent cyberattacks in Pakistan

An exponential rise in cyberattacks has been recorded since the Covid-19 pandemic and it’s projected to grow in the coming years. By the end of September 2021, cyberattacks had already succeeded by 17pc as compared to 2020.

The Pakistan government and private sector face the same challenges hence serious actions are needed to be taken to reduce network breach risks. Some of the recent and critical cyberattacks are listed below:

National Bank of Pakistan

On October 19, 2021, NBP’s services went down due to a cyberattack. It’s claimed that due to prompt response, affected systems were isolated from the network and any data breach or financial loss was prevented.

Federal Board of Revenue

The FBR’s data centre was hit by a cyberattack in August 2021 causing disruption to all the FBR’s websites. Even after the websites were restored after three days, they have faced several disruptions to date. As per Finance Minister Shaukat Tareen, the FBR faces 71,000 cyberattacks every month.

The writer is a visiting faculty member at Indus University, Karachi

Published in Dawn, The Business and Finance Weekly, January 31st, 2022

Follow Dawn Business on Twitter, LinkedIn, Instagram and Facebook for insights on business, finance and tech from Pakistan and across the world.

Opinion

Editorial

Judiciary’s SOS
Updated 28 Mar, 2024

Judiciary’s SOS

The ball is now in CJP Isa’s court, and he will feel pressure to take action.
Data protection
28 Mar, 2024

Data protection

WHAT do we want? Data protection laws. When do we want them? Immediately. Without delay, if we are to prevent ...
Selling humans
28 Mar, 2024

Selling humans

HUMAN traders feed off economic distress; they peddle promises of a better life to the impoverished who, mired in...
New terror wave
Updated 27 Mar, 2024

New terror wave

The time has come for decisive government action against militancy.
Development costs
27 Mar, 2024

Development costs

A HEFTY escalation of 30pc in the cost of ongoing federal development schemes is one of the many decisions where the...
Aitchison controversy
Updated 27 Mar, 2024

Aitchison controversy

It is hoped that higher authorities realise that politics and nepotism have no place in schools.