Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.

HP Tech@Work
Today's trends for tomorrow's business
New Cyber Security Threats

New Cyber Security Threats

Linsey Knerl
|
The cost of cyberterrorism is real and significant to businesses today. The harm they cause is increasing each year, with estimates showing that 78% of US organizations have fielded a cyber attack in the past year. The threats come with a price tag, too, with an attacked company spending roughly $13 million to fix the harm done.
What can companies do in the face of such a growing threat? One way is to stay informed of the dangers that lurk online. We’ll go over the most anticipated new threats in cyber security to your business in the coming year.

What are cyber threats?

The term “cyber security threats” covers all intentional crimes against others using a computer. Types of cyber security threats include an attack on a single computer, a system, a network, or a group of each. The crimes vary and include fraud, theft, disabling networks, exploiting data, and harassment.
While most perpetrators use the internet to commit these crimes from afar, that’s not always the case. Inside jobs are also possible by way of criminals accessing information stored on internal networks. Because so much of today's business is stored as electronic data, the reward for cybercriminals can be significant, with the risk to your intellectual property and assets very real.

10 cyber security threats to know about

As technology changes, the biggest threats to data and security will change, too. Right now, these 10 types of attacks have been identified as the most likely threats to today's businesses.

1. DEEP FAKES (VIDEO AND AUDIO)

Don't believe everything you see. Deep fake videos are everywhere, and they can trick most people with their deceptively placed footage or audio clips to make you believe what you’re seeing is authentic.
They were first attempted in 2014 by a PhD student-turned-Apple employee, and these realistic videos have frightening consequences. Criminals may use deep fakes to blackmail or extort those falsely depicted in videos, even if they had no such legitimate connection to the contents. As more people turn to videos on social media to make decisions, the threat becomes more serious than ever.

2. SYNTHETIC IDENTITIES

 SYNTHETIC IDENTITIES
Fake videos are one thing, but what about fake people? The rise of synthetic identities is a concern for consumers, who may find pieces of their data used to create false financial profiles.
By mixing social security numbers, addresses, birthdates, and other unique data fields from several genuine consumer profiles, identity thieves can open accounts and steal funds on a massive scale. Those caught confess to creating hundreds of identities for their own nefarious purposes.

3. PHISHING ATTACKS

These aren't a new threat, but hackers are using innovative phishing methods to do their work. They send what looks like a legitimate email or text to a customer, and the message will contain a link to a third-party site that asks for personal data, which the criminal can use for fraud or theft purposes.
Recently, cybercriminals have used election-related fundraising efforts and COVID-19 alerts in attempts to catch customers off guard. If you send out business communications, ensure your audience knows how to tell it's the real deal.

4. INTERNET OF THINGS

INTERNET OF THINGS
What started as home speakers and smart TVs now includes an entire world of connected devices in our homes and offices. While there’s value in easy access and hands-free assistance, there are also new risks to those who don't follow the best practices for security with devices and networks.
The Internet of Things encompasses more and more of what we use each day, with the newest items to market being at the highest risk. As tech developers and manufacturers churn out new gadgets, security experts must work harder than ever to keep up.

5. CLOUD JACKING

Threats to cloud storage and servers go beyond just stealing information. These giant computing powerhouses are the perfect way for Bitcoin and other cryptocurrency miners to mine data faster and for a better profit.
The concept of taking over a cloud-based server by force is called "cloud jacking,” and it has potentially devastating consequences. Cloud jacking takes away resources from all who rely on that server or network for hosting websites, running machine learning programs, or storing data.

6. MACHINE LEARNING POISONING

MACHINE LEARNING POISONING
Machine learning is incredibly valuable, and companies may use it to provide personalized recommendations for consumers based on their shared data. Cybercriminals will try to exploit this user-generated information in one of two ways.
For example, they could try to alter the recommendation outcomes by spamming systems with bad data, causing the product or service to perform poorly. They could also take things further with Trojans or other types of malware that impact both the system and the user.

7. SOCIAL MEDIA DISINFORMATION CAMPAIGNS

Professional fact-checkers exist because it’s sometimes challenging to separate fact from fiction, especially online. Bad actors can disrupt the status quo by planting fake or misleading information in viral social media posts and campaigns that accelerate the spread of false info.
Businesses are especially vulnerable to these campaigns, and it often takes just one fictitious bad review to cause a PR nightmare. Taking a steadfast approach to monitoring brand sentiment, social media mentions, and public relations snafus is a necessary part of doing business these days.

8. 5G VULNERABILITIES

5G VULNERABILITIES
It takes time to work out the bugs of any new tech, and the excitement for 5G doesn't mean there aren’t challenges for businesses when it comes to keeping things locked down. 5G, by its very nature, is more difficult to monitor because it involves more traffic routing points spaced closer together. Keeping an eye on wireless security is hard enough, and it’s only amplified by all the devices connected to your home or business network. This means you have more security checkpoints to worry about than ever before.
There's also a real possibility that an increase in bandwidth will lead to a significant boost in the data you send and receive. This alone increases the chances of hacks because there are more transactions to disrupt.

9. RANSOMWARE IN THE PUBLIC SECTOR

In the past, the most egregious ransomware attacks were limited to individual consumers or the private sector. But as the government (state and federal) switches to online portals, we'll see even more attempts to compromise data and extort money or private information through ransomware attacks.
While there's always the risk that someone will try to take your data hostage, it’s important to have robust backups and a plan for when things go awry to give you options that don't include paying the ransom.

10. AI-POWERED CYBERATTACKS

AI-POWERED CYBERATTACK
We may think we're too smart to be tricked by an automated call or badly written email, but what happens when artificial intelligence (AI) gets better at imitating speech and language patterns? Cybercriminals already use crude automated voice systems to act like humans and trick others into sharing private info or authorizing purchases and money transfers.
Experts anticipate AI to improve these or similar types of scams, although they are still largely a “what if?” at this point. AI becomes more powerful and frankly more intelligent over time, so we can expect these attacks to also become more sophisticated by their nature. It’s essential for businesses to know how to distinguish these attacks from real human interactions and educate their employees and customers, too.

How to prepare for new threats

If all of this sounds scary or overwhelming to you, you're not alone. In fact, IT departments globally are increasing budget share to include more security-focused solutions and handle these cyber security threats.
About 12.8% of IT spend is going toward security measures, including training and infrastructure. Unfortunately, many are reporting a lack of skilled workers to help prepare for future threats. Almost 85% of companies state that they are having a shortfall in this type of employee hire and can't find qualified security professionals to fill the gap.
With tech (and the associated dangers) evolving, there's no time like the present to start looking to tomorrow. Whether you do more to build awareness with your existing teams or you invest in top talent available to start now, you can’t afford to do anything. Whenever new tech launches, there's a group of criminals at the ready to exploit it.
Even if you deal with legacy systems and products that haven't changed much in years, your websites, personnel records, and financial transactions depend on the tech of the future to help you keep doing the business you do so well. By educating yourself about the biggest threats to cyber security, you can know the real risks out there and confidently invest in IT solutions to help mitigate those risks.

About the Author

Linsey Knerl is a contributing writer for HP® Tech@Work. Linsey is a Midwest-based author, public speaker, and member of the ASJA. She has a passion for helping consumers and small business owners do more with their resources via the latest tech solutions.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

Disclaimer

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license. https://www.nytimes.com/wirecutter/reviews/best-all-in-one-printer/

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit https://softwareoffer.intel.com/offer/20Q3-19/terms.

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (https://www8.hp.com/us/en/privacy/ww-privacy.html)