Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis On 2017 Threats.

Paulius Petretis, leading cyber security expert outlines some of the greatest cyber security threats that businesses need to be alert to in order to protect their companies and clients. 

Vilnius, Lithuania – January 21, 2017 – Paulius Petretis, CEO of VORAS Consulting posted a new article on the company website entitled “Cyber Security Threats and Trends To Watch For This Year” in which Mr. Petretis reviews the growing and very real threats.

Petretis writes, “It’s never been more important to secure your company against cyber-attacks.” He continues adding, “With hackers increasingly getting tougher in their scrutiny of cyber defenses, security is just one aspect of being prepared for these types of threats. There are policies and practices to adopt, insurance as well as legal ramifications to understand regarding the security of valuable information and client data.”

According to Petretis, “Companies both large and small have embraced the cloud and open source is now the standard for infrastructure software. And it’s no surprise that both create unique blends of benefit and risk.” Petretis elaborates, “When you consider that the average cost of a data breach for companies grew from $3.8 million last year to $4 million in 2016, a major attack or failure could be merely problematic or devastating.”

“With each year presenting more sophisticated attacks,” says Petretis, “we can certainly expect an increase in the number of cyber-attacks based on open source vulnerabilities.” He offers several examples, beginning with DDoS attacks on IoT devices. Petretis writes, “Cybercriminals will target all manner of internet-connected endpoints such as surveillance cameras and employ them in DDoS attacks.”

Additional Petretis talks about the lack of experience required to be a dangerous hacker. He points out that “The tools hackers and cybercriminals use are readily available and are easily within reach of anyone who wants them and has the money to pay.” With that in mind he states, “It’s easy to see that this trend will continue to grow.”

The entire article can be read here

Paulius Petretis

Paulius Petretis is an Information security expert, Certified Information Systems Security Professional (CISSP®), Certified Information Security Manager (CISM®), Certified Information System Auditor (CISA®), Certified in the Governance of Enterprise IT(CGEIT®) and Certified in Risk and Information Systems Control (CRISC®), Guest speaker at various conferences and seminars, Trainer at information security related training courses.

According to the annual survey initiated by the Info Security Europe, a whopping 93% of large organizations and 76% of small businesses had at least a single information security breach in 2011. Only 18% of the organizations affected by the infringements related to data protection laws had a consistent and effective contingency plan in place. According to Paulius, information is not something static – it evolves and mutates every day. It is the ecosystem of every business and if a single cell fails, it can bring down the entire business.

Therefore ensuring a consistent and up-to-date information protection policy must be the priority for all businesses – no matter how big or small they are. As it might be unrealistic to believe that any young or experienced entrepreneur can be the jack of all trades, the really smart decision is to rely on specialists who dedicate their professional lives to getting to know everything there is to know about protecting important business information.

With more than 16 years of experience in helping people, small businesses, and government organizations to protect their business secrets, Paulius believes that information security must help businesses achieve goals but not vice versa.

 

###

 

 

 

 

 

Cyber Security Threats and Trends To Watch For This Year

It’s never been more important to secure your company against cyber-attacks. With hackers increasingly getting tougher in their scrutiny of cyber defenses, security is just one aspect of being prepared for these types of threats. There are policies and practices to adopt, insurance as well as legal ramifications to understand regarding the security of valuable information and client data.

Companies both large and small have embraced the cloud and open source is now the standard for infrastructure software. And it’s no surprise that both create unique blends of benefit and risk. When you consider that the average cost of a data breach for companies grew from $3.8 million last year to $4 million in 2016, a major attack or failure could be merely problematic or devastating.

With each year presenting more sophisticated attacks, we can certainly expect an increase in the number of cyber-attacks based on open source vulnerabilities. What follows are a few areas that are trending cyber security threats globally this year.

The Internet of Things

The first area where we will likely see increased threats in DDoS Attacks is on IoT devices. Cybercriminals will target all manner of internet-connected endpoints such as surveillance cameras and employ them in DDoS attacks. In the rush to roll out all manner of IoT devices, security has taken a back seat. Worldwide spending on IoT security reached $348 million in 2016 and is predicted to climb to $434 this year. Some industry insiders also predict that by 2020 more than 25% of all identified attacks in the enterprise will involve IoT.

No Experience Necessary

Take into account that the tools hackers and cybercriminals use are readily available and are easily within reach of anyone who wants them and has the money to pay and it’s easy to see that this trend will continue to grow. Now add in the fact that experienced cybercriminals are offering high-quality ransomware to attackers with little or no technical knowledge or skills in return for a cut of the extortion profits. Now you have a recipe for sparking the exponentially rapid growth of cybercriminals.

Third Party Security Gaps

You can build an excellent security system and put all the right policies in place, but until you subject all of you third-party partners to the same level of scrutiny, your customers will still be at risk. Policies need to be tightened up with proper oversight to ensure that sub-standard security measures and systems don’t lead to major exposures.

Ransomware

Ransomware looks likely to spread into IoT devices, PoS systems, and ATMs. If you want your files back after a successful ransomware attack you’re probably going to have to pay the ransom. If you don’t want to end up held to ransom and out of pocket, then you need to act to mitigate the risk. Believe me, it will be a lot cheaper to take preventative precautions.

Diminishing Labor Pool

There have never been more jobs available in cyber security. Currently there are more than a million vacant IT positions worldwide. This shortage of skilled cyber security workers puts even the most sophisticated companies at risk and calls for more sophisticated protective measures.

If you are ready to explore how to take the most effective measures against the viable cyber attacks call our offices. VORAS Consulting is partnered with IBM and can provide the new Watson System for Cyber Security. Give us a call today.

 

 

 

 

 

 

Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Writes About IBM Watson.

Paulius Petretis, leading cyber security expert reveals that IBM’s Watson for Cyber Security is now available in Europe and explains how this new platform can thwart the efforts of the most sophisticated cyber criminals.

Vilnius, Lithuania – January 10, 2017 – Paulius Petretis, CEO of VORAS Consulting posted a new blog on the company website entitled “Let IBM Watson Be Your Company’s Cyber Security Expert” in which Mr. Petretis reviews the Watson AI platform for cyber security.

Petretis writes, “Cyber-security is on every company’s top priority list. And, it’s no wonder with threats and attacks coming from every conceivable direction and some that are inconceivable.” He continues adding, “Some organizations are seeing more than 200,000 security events on a daily basis. The threat to data is overwhelming even the most skilled professionals.”

According to Petretis, “IBM has recently introduced Watson for cyber security technology.” He adds, “According to Security Intelligence, “This new platform embeds Watson for Cyber Security’s unique ability to understand, reason and learn about security topics and threats. By tapping into and making sense of structured and unstructured security knowledge that has previously been elusive to an organization’s SOC (including imprecise human language contained in blogs, articles, reports), it augments a security analyst’s ability to fill gaps in intelligence, speed and accuracy.” (https://securityintelligence.com/bringing-the-power-of-watson-and-cognitive-into-the-security-operations-center/?cm_mc_uid=89932190689814872709458&cm_mc_sid_50200000=1487270945)

The entire blog can be read here

Paulius Petretis

Paulius Petretis is an Information security expert, Certified Information Systems Security Professional (CISSP®), Certified Information Security Manager (CISM®), Certified Information System Auditor (CISA®), Certified in the Governance of Enterprise IT(CGEIT®) and Certified in Risk and Information Systems Control (CRISC®), Guest speaker at various conferences and seminars, Trainer at information security related training courses.

According to the annual survey initiated by the Info Security Europe, a whopping 93% of large organizations and 76% of small businesses had at least a single information security breach in 2011. Only 18% of the organizations affected by the infringements related to data protection laws had a consistent and effective contingency plan in place. According to Paulius, information is not something static – it evolves and mutates every day. It is the ecosystem of every business and if a single cell fails, it can bring down the entire business.

Therefore ensuring a consistent and up-to-date information protection policy must be the priority for all businesses – no matter how big or small they are. As it might be unrealistic to believe that any young or experienced entrepreneur can be the jack of all trades, the really smart decision is to rely on specialists who dedicate their professional lives to getting to know everything there is to know about protecting important business information.

With more than 16 years of experience in helping people, small businesses, and government organizations to protect their business secrets, Paulius believes that information security must help businesses achieve goals but not vice versa.

 

###