When Eid Al -Meaning approaches … why do fears increase the increase in cyber attacks?

With high digital activities in the region of approaching Eid Al -Middle East, the increase in electronic attacks increases fears, especially during this period of heavy use of high purchase and digital platforms. Expectations of deep fraud (deepfake), DDOS attacks and IOS gaps (IoS) exploitation of complex cyber threats, including the exploitation of IOS gaps (IOT). In this rapid development of attack methods, it is necessary to develop at the same speed of protection.

“From the last Eid Al -Adhta, the attacks have developed significantly and have become roles in the economics, especially in the economic departments through artificial intelligence from traditional support.”

Middle East Vice President Osama al -Jobby at Cyber ​​Security Company (Phosphors)

From disruption to damage

More than 200 effective attacks have been recorded in the first quarter of 2024, as the festival seasons usually see a significant increase in service -preventing attacks, as it reaches a maximum of 280 GB per second, including three weeks of campaign. These attacks have been implemented on Batten Networks that rely on internet devices such as intelligence cameras and routers. Al -Jaubi insisted that “Open the easiest doors to the attackers” ignoring weak passwords, delayed updates and fixed software updates. ” He believes that the rapid extension of the use of equipment connected in cities like Dubai and Riyadh can sometimes exceed available security capabilities.

Eid Season … Season of Attacks

The risk of vacation is increased due to the change of consumer behavior, such as relying on travel applications, wiping out “QR” icons or communicating with digital donation campaigns. The attackers are taking advantage of these rituals to act as a state of legal parties and lead the victims towards the fraudulent pages. Al -Joubi warned the “QR” symbols leading to fake gates, along with the apps hidden as a travel evence or donation platforms. It is recommended to activate multi -factor authentication and develop strict internal verification procedures with continuous monitoring of digital platforms.

The invisible threat

Companies often neglect devices that are not subject to direct management, especially the operating surroundings (OT) and IIOT Internet. These devices include air conditioning systems, cameras and digital banners.

Al -Jobby believes that the wrong or updated equipment, such as intelligence cameras, is in the most popular weaknesses, especially when using virtual accreditation or productive programs. It emphasizes the importance of immediate supervision and the use of automatic discovery tools to monitor any abnormal behavior.

Security researchers: devices that are not paved or not maintained, especially in the Internet of Things. Those who attack weaknesses are exploited (chatrtock)

Protection begins quickly

With the acceleration of attacks, periodic tests are no longer suitable. Al -Jouobi confirms that the real -time monitoring is like a digital monitoring tower, which reveals immediate suspicious activity and gives security teams an opportunity to interfere with damage. During sensitive seasons, companies want to improve security teams or contribute to external monitoring services and perform field exercises that mimic actual penetration scenes.

“Zero Confidence” … an advanced security philosophy

Zero Trust is a basic solution because communication or policy is not allowed only after continuous verification. He adds: During the EID Eid season, when digital transactions rise, the need for a model that does not expect goodness, but it is necessary to achieve at every step.

While the attackers use artificial intelligence to create sophisticated messages and deception, security crews increase their use. Al -Joubi stated that security activities supported by Artificial Intelligence, especially in infrastructure and smart national projects. “From suspicious entrance attempts to mass construction campaigns, artificial intelligence is needed to analyze large amounts of data,” he said.

Experts: The “Zero Confidence” model and immediate monitoring is one of the leading defense strategies during the digital peak period (Chatrtock)

Protection begins with basics

Despite the development of tools, the basic methods of software update, changing virtual passwords and network division are still the first row of protection. Al -Joubi claims that small and medium -sized companies can protect themselves by automating updates and by conducting passwords and adds that “human fault is still a great threat, continuous training and fake quantities.”

Advanced systems and law

Attempts to manage cyber atmosphere in the Gulf, especially in Saudi Arabia and UAE, are accelerated by new legal framework focusing on the Internet of Things. Al -Jaubi hopes that regulatory regulations will expand to ensure comprehensive protection in delicate periods, to include traditional networks and connected environments.

Al -Jobby’s speech reflects a basic lesson, which means companies who adopt pre -strategies such as general updates, employee training and clear response plans are less harmful.

He concluded by saying: “Cyber ​​security is no longer a response to dangers, but it should be an integral part of a business model.”

Source link

Related Articles

Back to top button