Zoom found that 1.6 billion traffic anomalies were recorded in 2021 with 62% of these anomalies categorized as malware based on the BSSN report.
Heaptalk, Jakarta — The increasing number of internet users in Indonesia also increases the vulnerability of users’ cybersecurity. The National Cyber and Encryption Agency (BSSN) reported that there were 1.6 billion traffic anomalies recorded in 2021 with 62% of these anomalies categorized as malware, and 1.6 million advanced persistent threat (APT) activities recorded in the same year.
The rise of cybersecurity hacks is also emerging as more companies expand their digital footprints by adopting hybrid work styles. Along with that, cyber threats will evolve and become more sophisticated. The condition forces companies to build a robust cybersecurity framework against threats as part of their long-term business strategy.
Chief Information Security Officer at Zoom Michael Adams shared his views on issues that companies need to anticipate in the next year covering several main points, from strengthening cybersecurity to increasing dependence on cloud technology.
Michael suggested cybersecurity team leaders increase their focus on strengthening cybersecurity. “While the primary focus of cybersecurity programs will remain on protecting companies from cyber threats, we can expect an increased focus on cyber resilience,” said Michael in a written statement.
Cybersecurity does not only cover protection but also recovery and continuity in a cybersecurity-related incident. Investing in resources to protect companies from cyber threats as well as in people, processes, and technology is essential for mitigating the impact of cyberattacks and continuing company operations after cybersecurity-related incidents.
Cyberattacks may use deep-fake technology and artificial intelligence
In addition, cybersecurity teams need to protect companies from increasingly advanced spear phishing and other social engineering attacks. The sophistication of spear phishing and other social engineering attacks makes it difficult to identify the perpetrators of the attack, which makes the process of defending companies against perpetrators even more challenging. Michael delivered, “We can expect increasingly advanced social engineering attacks in the next year, which use deep-fake technology and artificial intelligence.”
Instability in the software supply chain may provide cracks for large-scale cyberattacks. Michael mentioned an example of The United States that has taken steps through an Executive Order to secure the software supply chain for government agencies. Many companies also carry out strategies to strengthen their cybersecurity, from considering a zero-trust approach to scaling up the security of infrastructure services, spanning code signing, and release process hardening.
Further, Michael warned that rising reliance on cloud service providers can open up greater opportunities for cyberattacks against enterprises. The flexibility that cloud technology offers allows more companies to deploy cloud technology to numerous areas and enables a variety of unique implementations to cloud technology.
However, by doing so, companies also expand the opportunities to be attacked. “Enterprise IT team leaders also need to implement a thorough evaluation process for these third parties and understand the technology they use for the backend,” said Michael.
Zoom recognizes that user security and privacy are fundamental aspects of a company’s accomplishment. Although multiple features are available to maintain information security on the Zoom platform, Michael suggested users do these things to prevent hacking during meetings, including applying waiting rooms, locking the meeting room, controlling chat features and screen sharing, as well as utilizing the remove participants feature.