Four areas with a growing cyber risk of digital extortion

The following post was ghostwritten on behalf of a cybersecurity solutions firm. The topic was pitched and accepted for publishing by Cyber Defense Magazine.

In a world where it’s becoming the norm to use digital assets as a medium of exchange and to see systems updating information as soon as it’s received, it’s no secret that our digital footprints are growing exponentially. This growth in our online presence and our reliance on online tools increases the cyber risk that your business can be taken out entirely by a digital extortion attack.

Many attackers use ransomware as their weapon of choice, denying a business access to its data and demanding a sum of money for its return. And, as the internet expands, attackers are finding more ways to interrupt critical processes in hopes that it will force a business into paying them off.

So, what new technologies are attackers targeting, and what can you do to keep your business up and running? Here are some things to keep an eye on:

1. Phones: Now that you can share money and files away from your desktop, computers aren’t the only devices you need to worry about protecting. Once a hacker taps into your mobile phone, he can listen to your calls, read your text messages and access your address book and apps. He can also guide you to download malware that leads to a ransomware attack.

  • What can you do? Always be wary of what company information your employees can access from their personal devices. If they store sensitive data or files on their phones and later connect them to an unsecure network (i.e. a public WiFi network), bad actors can access that information rather easily, steal the data and demand ransom. Any personally identifiable information should only be made available through your company’s secure network. Make sure employees understand and are trained on these policies.

2. Social media: If an attacker gains access to your company’s social media account or creates a fake account under a name similar to yours, he can do instant and irreversible damage to your organization’s reputation. Attackers can share fake information on behalf of your business, gain the trust of your clients and followers and post sensitive information for the world to see, demanding a hefty fee to give you access to the account(s). Once this information has been shared, it’s difficult to remove from the public eye.

  • What can you do? Businesses should treat their social media accounts as if they’re bank accounts. Set up two-factor authentication, create strong passwords and limit account access to only a few employees. Monitor social platforms for any fake accounts that may have been created in your company’s name, as these can be just as damaging to your reputation as having your official account overtaken.

3. Real-time services: Any business that offers real-time services (such as banking
institutions, health care providers, etc.) should be especially alert for extortion attacks. Attackers know that interrupting key components of what makes your business function will put more pressure on you to resolve the issue quickly. And sometimes, resolving the issue quickly might mean paying the attacker what he’s asking for in order to avoid a longer downtime.

  • What can you do? Make sure you have adequate backups of your data and a recovery plan in place. Establish guidelines for how long your business can afford to be down and how long it will take you to restore data afterwards. Set up processes for determining where attacks may be coming from (especially if your organization employs hundreds to thousands of people), and make sure your employees know how to report any suspicious activity.

4. Cryptocurrency: With any digital asset that can equate to cold hard cash comes the threat of extortion or theft, and cryptocurrency is not immune. If you choose to buy bitcoins, be aware that attacks have already begun, and they will only become stronger and more frequent.

  • What can you do? Stay on top of the latest industry news and laws, and use backup and encryption methods to your advantage. Don’t save the passwords to your digital wallet on any personal devices or online password banks. And, when you’re not using it, make sure you store your digital currency offline.

While new technologies and digital services can pose a significant threat to your brand and critical processes, ensuring you have the proper planning and detection methods set up can save you a lot of headaches – and money – as extortion methods expand.

Published by Kelsey Hudnall

A storyteller at heart, I'm energized by the opportunity to craft error-free content that inspires and motivates. With more than five years of experience creating and editing copy for blogs, news stories, websites, magazines and more, I’ve mastered the art of taking a key message and strategically adapting it to meet specific channels and audiences, whether they are external or internal. Through a variety of roles at organizations ranging from 10 to more than 30,000 employees, I’ve crossed paths with more than 12 industries, ranging from health care and technology to government, nonprofits and photography. I have experience in both B2B and B2C settings and am always looking for a good challenge.

%d bloggers like this: