Shopping Cart

No products in the cart.

IT Professionals Have To Be More Pro-Active as Cybercriminals Continue To Get More Creative

Akira, a ransomware group that has been making waves in cybersecurity, made headlines again recently by utilizing an unconventional route to gain access to a company’s network: A webcam.
The hackers tried their normal attack methods, through Windows, but the unnamed victim’s Endpoint Detection and Response (EDR) solutions stopped the threat.
But then the cybercriminals moved to the webcam and found their way in.
Internet of Things and Operational Technology devices like webcams are often vulnerable for several reasons: They are not considered during cybersecurity planning, resulting in a lack of protection against hackers; EDR solutions do not work on IoT and OT devices and they are not closely monitored like other devices. And in this case, Akira used the fact that Linux was webcam’s operating system to initiate the breach.
Once in the network, the criminals escalated privileges before moving laterally, encrypting the company’s data and holding it for ransom.
Research recently reported by SonicWall said the average cyber-ransom, at least in 2024, was $4.91 million. The study also stated that IoT threats increased by 124%, demonstrating that this unconventional attack might become more conventional moving forward.
One protective measure that could have been utilized to mitigate Akira’s damage once in the network is zero-trust security. Through this model, instead of assuming a user is granted access, it does the complete opposite, trusting no one. It employs constant verification, continuous monitoring and strict controls. This method would have minimized navigation within the network by the criminals with its relentless approach. Zero trust also would have noted the inconsistent behavior by the hackers and limited access even further.
The implementation of this strategy or any cybersecurity strategy requires the expertise of IT professionals. The days of relying on simple anti-virus software are in the past. Cybercriminals continue to develop new tools that function automatically 24 hours a day. They evolve and learn, implement Artificial Intelligence and use their immense skills to pillage companies for big stakes. Maybe that is why the bad actors at Akira are not getting caught.
Criminals like them can make operating a business a scary proposition.
So, what’s the best course of action to protect yourself, your data and the future of your business?
In the footprint of FTC and surrounding areas, it is the experts at FTC IT Solutions. They possess and understand the necessary technology and are doing their own constant monitoring of the best products in the workplace to better protect their clients. Like the hackers, they adapt their approaches and customize them as needed. In addition to fending off attacks, they are IT professionals in the truest sense of the term and can assist you with basic and advanced computer and network needs to help you run your business more efficiently.
So, if you do not have the budget to hire an IT department of your own and have come to the realization that you need help with securing your business from the ever-increasing onslaught of cyberattacks, then call 888-218-5050 and find out what FTC IT Solutions can do for you.