• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

2020: The year that cybersecurity went from reactive to proactive

By Robert Roohparvar | At January 16, 2021

January 16, 2021

2020: The year that cybersecurity went from reactive to proactive

The year 2020 has literally been like no other. The entire world went from being very connected, where people could easily meet each other without a second thought, to suddenly having to think about every single movement they made. One of the biggest changes that we saw take place was how everyone interacted with one another. The “new” world is mostly online. 

Within the first few months of the pandemic, Zoom was valued more than the top airlines of the world – combined! The mass scale up of everyone moving everything online, came with another pandemic, one that was online. 

There was an 800% surge in cyberattacks – on average, the world saw almost 4000 cyber attacks every single day. 

The move from reactive to proactive cybersecurity

Just how quickly people switched over to Zoom, we saw just how unsafe the platform was in terms of cybersecurity. “Zoombombing” became a common occurrence, where uninvited guests could drop into an ongoing Zoom call. The developers at Zoom had to quickly follow up with security patches, which they did but then the attackers moved on to Twitter. The attack on Twitter showed the world that the IT security teams can no longer afford to wait until the attack happens to fight it, the “new normal” needs to be one where the hackers are never successful in their attack. 

The second half of 2020 was all about the proactive approach. We could see this approach working, only a handful of cyberattacks were successful towards the end of the year. A lot of cybercriminal gangs were taken down by law enforcement agencies and the world online, was a lot safer.

Expecting the unexpected

Traditionally, people and businesses have trusted whoever is on the “inside” and defense strategies are only used for the “outsiders”. 2020 has given everyone a lesson to “expect the unexpected”, in terms of absolutely everything. 

Offices have adopted a “zero trust approach” one that applies to both inside and outside the office. 

Employers and employees together are taught to make better decisions in their time online. Nothing is on “automatically trust”, this includes everything from emails, websites to applications, everything needs to be manually trusted. This practice helps teams isolate systems and prevent a widespread attack that could attack multiple user accounts, devices and the entire network all at once. In addition to these, predictive analytics are being used to find patterns in the system, everytime something out of the ordinary is noticed, it can be checked out and any possible threats can be ruled out, or dealt with, in a timely manner.

The takedown of EncroChat and Safe-Inet

Criminals that work through the internet can be one of the smartest people. A lot of organised crime gangs had moved over to using tools like “EncroChat” to communicate using encrypted messages. Police forces across Europe hacked and shut down the EncroChat network by harvesting data, such as passwords, messages, and geolocations. This led to a mass takedown of criminal gangs. 746 criminals were arrested in the UK alone, these were people that were suspects in high profile crimes such as murders and smuggling. The operation also led the police to seize £54m in cash and more than 1.5 tonnes of cocaine.

It was found that criminals were using VPNs to communicate with one another in a way that they wouldn’t be found. Safe-Inet was one of the most popular ones they used. Its premium version gave the users 5 layers of protection, making them virtually untraceable. Law enforcement agencies hacked into their system and found that using the VPN, criminals were targeting at least 250 companies. The servers were taken down immediately and Safe-Inet services were shut down – saving the data of several companies. 

The dangers of criminalizing VPNs and encrypted communication

It is important that we don’t fall into the notion of “Whoever uses a VPN or encrypted communication services has something to hide”. There are several countries in the world where citizens are under mass surveillance and have no privacy even when using their own devices. If someone is a law abiding citizen, they have the right to have privacy in their personal communications.

Letting law enforcement agencies, “get in through the backdoor” is bound to end up causing a lot more problems than it solves. 

Proactive cybersecurity measures are important to protect companies and people in the long run. It’s integral that people have access to resources like VPNs and encrypted communication tools for their own safety and that the tools aren’t criminalised, only the criminals using them for criminal activities are.  

Filed Under: Cyber security news

Primary Sidebar

Archives

  • [+]Cloud security (16)
  • [+]Compliance (14)
  • [—]Cyber security news (101)
    • 03 security concerns for low-code and no-code development
    • 04 ways to improve your security posture in 2020
    • 05 ways malware can bypass endpoint protection
    • 11 million stolen records of French users put up for sale online
    • 2 Million Patients’ Data Compromised in Cyber Attack on Shields Healthcare Group
    • 2020: The year that cybersecurity went from reactive to proactive
    • 3 Huge Cyberattacks Show the True Extent of Cyber Crime
    • 30% of SMEs have no data security, says study
    • 4 Cybersecurity trends in 2019
    • 4 Reasons why website security is important
    • 40 Million User Records from Largest Commercial Bank in Ukraine Sold Online
    • 5 Methods to Make Customer Experience Safer
    • 6 Benefits of Cyber Security Automation (2022)
    • 95% of websites risk operating on outdated software with known vulnerabilities
    • All About Data Repository
    • America’s small businesses aren’t ready for a cyberattack
    • Attacker’s phish Office 365 users with fake voicemail messages
    • Attackers impersonate Zoom to steal Microsoft account credentials
    • Can We Rely On Cyber Insurance?
    • Changing Trends in Cybersecurity Training
    • Colonial Pipeline Forced to Pay $4.4m After Ransomware Attack
    • Common types of cybersecurity threats
    • Consumers Must Prioritize Safety Over Convenience
    • Coronavirus Used to Spread Malware
    • Cyber Crime is a Threat to the Energy Sector; Here’s Why
    • Cyber Research: Meta-owned Apps Are Most Vulnerable to Cyberattacks
    • Cybercrime economy is worth $1.5 trillion in illegal profits: study
    • Cybercriminals are Capitalizing on Covid Vaccines to Launch Attacks
    • Cybercriminals are Resorting to Automated Attack Tools
    • Cybercriminals: Threat or Menace?
    • Cybersecurity Challenges for Businesses in 2022
    • Cybersecurity challenges for small businesses
    • Cybersecurity in the Aviation Industry
    • Cybersecurity Trends That CISOs Must Consider in 2022
    • Cybersecurity: Guiding Principles for Board of Directors
    • Data of 1.3 million users leaked in Clubhouse security breach
    • Facebook Messenger Users Fall Victim to Scamming Attacks in Over 80 Countries
    • Five experimental cybersecurity trends your business needs to know about
    • Four major data breaches 2018
    • Four significant changes coming to cybersecurity in 2020 and beyond
    • Hacker Tries to Poison Water Supply of Florida Town
    • Hackers are outpacing defenses, a new report finds
    • Hackers are using famous file sharing services to hack email accounts
    • History of Cybersecurity and Hacking
    • Hospitals are becoming smarter than ever. But so are cybercriminals
    • Hostinger suffers from data breach and resets password for 14 million users
    • How AI can help you stay ahead of cybersecurity threats
    • How does spyware work?
    • How to Check if Your Data Was Leaked in Facebook's Huge Hack
    • HP Printers Are Vulnerable to Hacking
    • Human Error And Chinese Data Security Breach
    • Measures taken by WhatsApp to avoid spam
    • New Act Passed Towards Securing the DHS Software Supply Chain
    • North Korea has been targeting threat researchers
    • One in three organizations suffered data breaches due to mobile devices
    • Phishing in 2020: Another Problem for an Already Difficult Year
    • Predictions of Future Cybersecurity Trends in 2020 and Onwards
    • Property firm cyberattack leaves home movers in the lurch
    • Protect backup from ransomware attacks and recover safely
    • Qbot Banking Malware is back with a new version
    • Quantum Computing and Cybersecurity
    • Retailer Company Hit With Ransomware After Reveling Customer Data
    • Russia-linked gangs attack US critical infrastructure most often
    • Scammers Add an Extra Worry for Travelers Post-COVID
    • School Re-Openings Disturbed by Ransomware Attacks
    • Spyware Pegasus Hacked Thousands of iPhones Globally
    • Supply Chain Cyber Attacks See a Troubling Rise
    • Syniverse Quietly Reveals 5-Year Data Breach
    • The 4 biggest ransomware attacks of the last five years
    • The 6 Biggest Cyberattacks of 2020
    • The Biggest Recent Data Breach Might Have Cost $58 Billion to Resolve
    • The Correlation Between Cyber Insurance and Increasing Cyber Risk
    • The Daixin Team Cybercrime Group Hits Health Organizations With Ransomware, US Agencies Warn
    • The majority of ransomware attacks are targeted at the United States
    • The Next Big Threat: Human Killing Cyberattacks
    • The rise of cryptojacking
    • The shortcomings of centralized server architecture
    • The Top 5 Cyber Security Breaches of 2017
    • Threat or Opportunity? Big Data and Cyber Security
    • Three trends shaking up multi-factor authentication
    • Top Cyber Power Revealed With the US at the Top of the List
    • Top five cybersecurity predictions for 2019
    • Two in three businesses faced insider attacks in 2020
    • Two-factor authentication explained
    • Unsecure Server Compromises 350 Million Emails
    • US insurance company has customer data leaked on a forum
    • US-based auto parts distributor has sensitive data leaked by cybercriminals
    • Use of OSINT tools for security and their functions
    • What is Encryption and its common types
    • What is information security? Definition, principles, and policies
    • What is Magecart? How it works and how to prevent it?
    • What is Typosquatting and How to Stay Safe
    • What the G7 Summit Means for the Future of US-Russia Cybersecurity
    • Which Industries at Higher Risk of Cyber Attacks in 2021
    • Who is Most Vulnerable to Cybercrime: New Report Reveals Surprising Insights
    • Why 2021 Could Witness an Outbreak of Ransomware Attacks
    • Why Cybersecurity Has to Be a CEO Level Matter
    • Why Do Cybercriminals Target Charities?
    • Why You Should be Concerned About How Phishing Attacks are Evolving
    • Will 5G improve mobile security?
    • World’s largest data breaches
  • [+]Cyber security threats (249)
  • [+]Cyber security tips (231)
  • [+]E-Commerce cyber security (3)
  • [+]Enterprise cyber security (2)
  • [+]Financial organizations cyber security (2)
  • [+]General (22)
  • [+]Government cyber security (2)
  • [+]Healthcare cyber security (6)
  • [+]Law Firms Cyber Security (4)
  • [+]Network security (3)
  • [+]Newsletter (1)
  • [+]Ransomware (9)
  • [+]Risk assessment and management (5)
  • [+]Security management and governance (4)
  • [+]Supply Chain Attacks (1)
  • [+]System security (3)
  • [+]Uncategorized (14)
  • [+]Vendor security (10)

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • The Top 5 Email Security Threats
  • The Top 4 Supply Chain Security Threats to Watch Out for in 2023
  • Botnet Attacks: Everything You Want to Know

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Copyright © 2023