cybersecurity

cybersecurity

How Copilot Can Safeguard SMEs From The Growing Storm Of AI-Boosted Cyberattacks

How Copilot Can Safeguard SMEs From The Growing Storm Of AI-Boosted Cyberattacks

As Generative AI and the Emergence of Ransomware-as-a-Service Create Growing Challenges for SMEs, ALSO Cloud UK Highlights the Essential Support Offered by AI Copilot Tools.

The increasing prevalence of Ransomware-as-a-Service (RaaS) and generative AI is creating significant challenges for SMEs. As RaaS becomes more accessible, cybercriminals are able to execute complex attacks more easily, turning it into a billion-pound industry supported by organized and state-sponsored groups.

While larger companies can handle these threats due to their extensive cybersecurity teams, SMEs are more vulnerable. They face a greater risk of being targeted due to their weaker security posture and smaller scale, which makes them attractive to attackers seeking quick payouts.

Mark Appleton from ALSO Cloud UK believes that SMEs are especially at risk due to their limited security resources. “Smaller businesses might assume they’re safe, but attackers know that they’re likely to pay quickly and have weaker defenses. This makes them repeat targets for ransomware attacks.”

However, Appleton sees hope in AI-powered copilot solutions. “Although generative AI fuels RaaS, it can also provide the tools needed to counter it. Copilot technology offers a valuable defense mechanism and can be integrated into SME security systems by MSPs, reducing the need for extensive internal resources.”

He adds, “SMEs don’t need to invest millions in security software. By partnering with MSPs and utilizing cloud marketplace solutions, they can access expert assistance and training with ease. This collaborative approach can fill gaps in knowledge and resources, making cybersecurity more accessible.”

Appleton concludes, “With the right Copilot tools and expert partnerships, SMEs can enhance their defenses against ransomware. Generative AI, while a threat, can also be harnessed to proactively prevent attacks and safeguard operations effectively.”

Increase in Business Email Compromise (BEC) Attacks Prompts New Guidance from National Cyber Security Centre

Increase in Business Email Compromise (BEC) Attacks Prompts New Guidance from National Cyber Security Centre

The sophistication of Business Email Compromise (BEC) attacks means that cybercriminals are gaining access to more sensitive data, necessitating stronger defenses from businesses.

In response, the National Cyber Security Centre (NCSC) has recently issued new guidance for businesses on the threat posed by BEC attacks. These sophisticated attacks have seen significant success in recent months, highlighting the need for businesses to be better prepared to counter the threat.

BEC is a form of phishing, but unlike most phishing attacks that are general and broad, BEC attacks are tailored to individuals within organizations and are extremely convincing. While general phishing attacks use a scattergun approach, sending millions of emails in the hope that a few unassuming individuals will open them, BEC attacks require much more investment from cybercriminals. They tend to target “big fish,” often senior executives or employees with access to particularly valuable data.

The NCSC’s new guidance encourages firms to reduce their digital footprints by limiting the amount of publicly available information about senior executives. It also recommends training staff to identify BEC attempts, setting up two-step verification processes, restricting the number of employees who can make significant payments without further authorization, and planning for the worst by preparing to respond robustly to a successful BEC attack.

Whilst this guidance is useful, it also adds to the workload and budget expenditure of IT and security teams, which are already overcome by the burdens of increased threats and reduced budgets, as AJ Thompson, CCO at Northdoor plc, explains.

“In the face of an increasingly sophisticated threat, this new guidance from the NCSC makes complete sense. Businesses must be aware of what this threat now looks like, and employees need to be educated.

“Variations of BEC have been grabbing the headlines. We recently saw cybercriminals successfully get their hands on £20m after an employee at Arup was duped by a digitally recreated version of the company’s CFO via a video conference. This level of sophistication is rare but does highlight the level of investment that cybercriminals are willing to invest to get huge pay-offs.

“The more common approach is for an email from a senior executive. Everything about it will look authentic, but a request for a money transfer or access to data will be made somewhere in the conversation. If convinced, the employee will do as their ‘senior manager’ has asked of them and be none the wiser until the money is missed or the data leaked.

“Much of the advice from the NCSC is common sense. Reducing the amount of information about senior executives available online makes the job of making a convincing replica all the more difficult. Two-step verification also adds complexity for cybercriminals and reduces the number of employees who can make large payments.

“The most critical piece of guidance, though, is the education of team members. After all, employees are targeted by BEC, so ensuring that they understand what a potential BEC attack looks like and how to effectively deal with anything suspicious immediately nulls the threat.

“However, much of this guidance, whilst important, is simply adding to the already substantial workload of IT and security teams. This is also often in the shadow of reducing budgets. It is clear that BEC now represents a real threat to businesses but without the adequate resources to counter it, businesses are stuck. Some are turning to consultancies that can offer the expertise that might be lacking internally, as well as the assurance that threats will be dealt with, staff educated and a worst-case scenario business continuity plan. Taking the onus off already stretched internal teams is a good way of ensuring BEC attacks do not slip through the gaps whilst empowering staff to identify and deal with potential threats,” Thompson concluded.

Addressing Alarming Cybersecurity Breaches: Experts Assert They’re Preventable

Addressing Alarming Cybersecurity Breaches: Experts Assert They’re Preventable

Linten Technologies’ emphasis on staff education as a pivotal aspect of cybersecurity aligns with contemporary best practices in the field. Cybersecurity breaches often exploit human vulnerabilities, making employee awareness and vigilance crucial components of any comprehensive defense strategy.

The statistics cited from the Cyber Security Breaches Survey 2024 underscore the pervasive nature of cyber threats across UK businesses, with phishing attacks standing out as a prevalent method used by cybercriminals, affecting 84% of businesses and 83% of charities.

The legal sector, in particular, faces heightened risks due to the sensitive nature of the information it handles, along with the potential financial repercussions of operational disruptions caused by cyber incidents.

CEO at Linten, Steven Allan remarked: “Our experience supports the government figures that businesses are investing more in malware protection, firewalls, multi factor authentication, and business systems and processes. Yet we believe many of those cyberattacks reported are avoidable.

“Many firms are missing one of the most important factors in cybersecurity – their staff.

“As well as creating the right infrastructure and investing in tools, a robust cybersecurity plan needs to engage, educate and empower the whole business, at all levels. This will significantly reduce the risk of a breach.”

In addition, Steven Allan commented that the data from the latest survey is not unexpected, adding: “Our experience of working with hundreds of firms of all sizes and in all sectors is that awareness of the nature of cyber threats remains low, so preparing to counter them is a major challenge.

“Too many small to medium size firms fail to take appropriate preventative action, for a variety of reasons; limited resources, often no dedicated IT staff, lack of awareness, and perception of low risk amongst them.”

In the past year, the latest data indicates a notable trend: cybercriminals are increasingly targeting larger companies. The statistics reveal that 74% of large firms have fallen victim to cyberattacks, compared to 70% of medium-sized firms.

According to the legal market intelligence website legalfutures, cyber attacks have affected nearly three-quarters of the UK’s top-100 law firms.

Allan added, “This is not an issue that is exclusive to big businesses, however figures and our experience suggests that the bigger you are as a company, the greater the risk of cyber criminals targeting you.

“The important lesson here is that, despite more investment in tools the number of breaches and attacks remains very high.”

In comparison to 2023, the government report indicates that firms are allocating greater investments across all facets of cybersecurity. This uptick may stem from an ameliorated economic climate or a heightened perception of the threat landscape. However, the report also underscores a concerning trend: a decline in the percentage of businesses seeking external information or guidance on cybersecurity.

This decline has been consistent since 2018 and 2019, raising potential concerns about the readiness of businesses to address evolving cyber threats through external expertise and support.

Allan concluded: “The threat landscape is evolving very rapidly, and many small to mid-size firms are simply unable to react sufficiently quickly or with the right tools. Outsourcing to cybersecurity experts is an obvious and cost-effective approach.

“For law firms in particular reputation is critical, which makes legal practices attractive targets for extortion.”

Overall, Linten Technologies’ insights underscore the ongoing challenges posed by cyber threats and the imperative for businesses to adopt a proactive and multifaceted approach to cybersecurity that includes staff education, investment in robust infrastructure, and strategic partnerships with cybersecurity experts.

For more information on Linten visit: https://linten.co.uk/