Where exactly do cyber threats come from?

  • December 15th, 2021 at 2:46 pm

Knowing your enemy is the first step in cyber protection. Let HP’s security experts introduce you to the bad guys.

HP’s comprehensive global Wolf Report into the current cybersecurity landscape highlights the ‘human’ nature of most attacks and emphasises the need for in-built security at the edge of your hybrid network. Here are few of the report’s key findings:

The Friendly Foe Dilemma

With employees working remotely, the lines between work and personal equipment are blurred, and innocent actions – such as opening an attachment – can have serious consequences. Without visibility of devices and how they are being used and by whom, IT and security teams are working with clouded vision.” – Joanna Burkey, Chief Information Security Officer For Hp Inc.

The Wolf Report found that 30% of respondents admitted they had allowed someone other than themselves (a partner, child, or friend) to use their work laptop, often more than once a day. Of those that had shared their device, 27% said they know they are not meant to, but they felt they ‘had no choice’ due to these being exceptional times.

Risky business.

Work laptops are supposed to be for work. But here’s what the report found they were also used for:

• Downloading from the internet: 33%

• Opening personal email attachments or web pages: 55%

• Visiting personal social media sites: 45%

• Making video calls 58%

• Playing games: 27%

 • Watching online streaming services: 36%

• Online shopping / internet browsing: 52%

Don’t open that: your inbox is a source of danger.

During 2020, HP’s Sure Click and Sure Click Enterprise telemetry encountered 126 cases where users attempted to download malware-infected files to Yahoo mailboxes, including for the Emotet botnet and ransomware.

Cybercrime and chill.

According to KuppingerCole analysis in the HP Wolf Security: Blurred Lines and Blind Spots Report1, streaming services were also targeted during the pandemic, with at least 700 fraudulent websites impersonating popular streaming services being identified in a 7-day period in April 2020. Phishing scams that targeted Netflix users increased 60% over 2019. Phishing URLS that targeted Netflix increased 646% over 2019, URLs that targeted Twitch increased 337%, targeting HBO increased 525%, and targeting YouTube increased 3,064%.

It’s no longer a game.

The explosion in gaming during lockdowns has had a comparable downside for security:

Malicious actors who exploited popular gaming platforms increased by 54% between January and April 2020, often directing users to phishing pages. Gaming-themed threats. In 2020, Sure Click and Sure Click Enterprise telemetry saw an increase in gaming-themed malware, particularly popular titles such as Fortnite and Among Us.

The threat explosion is real.

As companies extend corporate offices into the home environment, print security must no longer be a blindspot. The scenario of a printer being used to infect the wider corporate network is a very real potential. 45% of IT decision makers say they have seen evidence in their company of compromised printers being used as an attack point in the past year. It’s time companies woke up to this problem and protected themselves against printer-based attacks.” Hp Wolf Security Standpoint: Dave Prezzano, GM And Global Head, Print Services & Solutions For Hp Inc.

Let a HP Partner help you create your IT security plan

If you are interested in learning more about device security and how your organisation can make a plan that’s right for your business, download the eBook ‘Why your hybrid workplace needs a business technology plan’ today.

1 HP Wolf Security Blurred Lines and Blind Spot report