The Cyber Review: CSE Workers Strike, Predict Cyber Threats

February 26, 2021
Written by Farah

1. Why the ability to predict cybersecurity threats matter

Cybersecurity experts face risks daily from detecting to identifying various threats of all levels. Understanding that cybersecurity should not only take a defensive or reactive approach, rather a proactive one is key to protection. Attacks should not be analyzed after systems have been exploited. According to a research report by Ponemon Institute, the dwell time or time to identify and contain the threat is still around 300 days.

It’s time for organizations to start paying attention to prediction, detection, and response.

Organizations need to begin by anticipating attacks by implementing zero-trust strategies, leveraging real-time threat intelligence, deploying behavioral analytics tools, and implementing a cohesive security fabric that can gather and share threat intelligence. Perform logistical and behavioral analysis, and tie information back into a unified system can also preempt criminal intent and disrupt criminal behavior before it gains a foothold.

2. Hundreds of workers at cybersecurity agency vote to strike

Hundreds of workers at Canada’s foreign signals intelligence agency voted to strike after threats of cyber attacks related to the pandemic arise. The workers are asking for a wage increase to close the gap with workers in the private sector. The workers won’t be heading to the picket lines just yet as the negotiations are underway.

3. Making this Year Better for Cybersecurity

Important lessons businesses learned in 2020 and need to keep in mind for this year:

  • Home Networks and Remote Employees Regarded as Risks: Employees using their own devices at home is a huge risk because the devices are likely not secure, unpatched or vulnerable that could be used by cyber criminals as a gateway to the company’s network. Giving employees the proper guidance and instructions to strengthen their ability to detect possible hacks or threats is important.
  • Capitalising on Trending Media Topics Through Phishing: Phishing is becoming more difficult to spot as cyber criminals are creating phishing emails and messages that are almost identical to those they are impersonating. Remote workers need to be more vigilant about the content they click on, providing credit card info, or other persona information.
  • Supply Chain, Industrial Espionage and Advanced Persistent Threats: Hackers may be attacking supply chains more for political or economic reasons.