Toggle Menu
Request a demo Contact us Resources

In response to our request for comment for the Sunday Times Cybersecurity report, we spoke to our Principal Cybersecurity Consultant Elliott Thompson to gain his insight into the hackers ‘cashing in on coronavirus in the WFH era’.

The whole of the UK is working from home and so cyber hackers are exploiting vulnerabilities and stealing valuable information during this time of uncertainty and panic.

We asked Elliott some burning questions…

What are the likely attack routes for hackers at this time and what new types of phishing etc are we seeing?

A great deal of cybercrime is psychological – it’s about understanding people’s likely behaviours and fears at a time like this. People may be naively opening unrecognised attachments relating to current news, or not thinking as clearly when it comes to clicking on malicious links. A lot of individuals are eager to tap into some good news, which means criminals are capitalising on this messaging and creating a high risk for many. This includes emails pretending to be the World Health Organisation (WHO) who suggest they link to a new positive insight article. See some examples of the emails being sent by attackers on the BBC News site here.

We also have a few phishing blogs you can check out here to keep your organisation safe:

The Simple Way to Combat Phishing

How Confident Are You Against Email Threats?

Underpainting External Email Labels

 

 Are video conferencing calls now more vulnerable? What else is now more at risk for businesses and individuals?

Cybercriminals follow the money. If there’s a dramatic increase in the use of videoconferencing and other collaboration tools due to the rise of people working from home, then we’d expect to see criminals trying to target them. In the short to medium term, we’d expect to see existing phishing campaigns asking people to download and execute malicious payloads designed to look like working from home software. Similarly, companies quickly adopting consumer-grade video conferencing can make it easy for an attacker to pretend to be a member of staff. The cybersecurity industry is going to have to be dynamic and responsive on this front – as we always try to be. This is a unique situation that we’ve haven’t experienced before and so people are unsure of the guidelines and what they should and shouldn’t do. Perfect for a cybercriminal to exploit.

Do you think employers should take the lead and ensure workers ought to boost their cybersecurity, or is the onus on individuals?

The onus is primarily on employers as they hold the most power to make sure security standards don’t fall with a large number of staff working remotely. Specifically, in this situation, the focus should be on aggressive email filtering and ensuring that all entry points into the business require strong credentials and two-factor authentication. This is especially true where individuals previously could only access company resources from the office, passwords may not be sufficient to protect accounts now that they’re exposed over the internet.

Here’s a handy blog on how CISO’s can help to support their organisations effectively focusing on communication, collaboration and technology.

What are the best tips you can provide for businesses looking to improve cybersecurity across their organisations?

Cybersecurity is complicated, but many attacks are very simple. With the current ongoing health issue, the following steps would help organisations protect themselves from opportunistic attackers:

  • Enable two-factor authentication for all accounts that can be used remotely. If this isn’t possible, increase the minimum password length and force a reset.
  • If at all possible, avoid staff using their own personal computers to access internal company resources. If this absolutely can’t be avoided, virtual desktops could be used as a more secure alternative to a client VPN.
  • Inform staff that they may receive phishing emails/texts/calls/etc purporting to be information about COVID19 to prepare them to treat the messages with suspicion.
  • Check out the National Cyber Security Centre’s homeworking advice which can be found here and here.
  • Share this blog with your team so they can understand the full breadth of issues the cybersecurity team are facing during this unique period

About Elliott

Elliott Thompson, one of SureCloud’s Senior Security Consultants, delivers on a variety of large and unusual pen-testing engagements. Elliott engages targets throughout Europe, Asia, and the Middle East through infrastructure testing and reverse engineering to physical, social engineering and red teaming. Elliott has also appeared on the BBC as a cybersecurity expert, is a CVE identifier, CHECK Team Leader and CREST Registered Tester.
Elliott is passionate about security and involved in various article pieces for Infosec Magazine, the BBC and the UK consumer watchdog Which?. Furthermore, last year Elliott discovered and disclosed an exploit on Android tablets, which allowed attackers full access to the device including access to the webcam, speakers and microphone.

About SureCloud

SureCloud is a provider of Gartner recognised GRC software and CREST accredited Cyber Security & Risk Advisory services. Whether buying products or services your organisation would benefit from automated workflows and insight from the award-winning SureCloud platform. All of SureCloud’s service offerings are fully compatible with the GRC suite of products enabling seamless integration of information, taking your risk programmes to the next level.

Want to stay in the know? Subscribe to our (COVID-19) blog alerts by filling in the pop-up form in the left hand corner. That way, you’ll never miss a new expert update as we continue to monitor the threat landscape during this uncertain time.

Press Coverage

CIO Review

MillGens

 

How can we help?