Blog

Cyberattacks: who will be next?

By |

With more employees locked on to their screens for longer periods, this is indeed a great time for hackers to target their victims and monetize cyberattacks faster. This is why hackers have now diversified their attacks:

  • On the one end, they are attacking big enterprises such as large corporations, financial institutions, and healthcare research firms involved in Covid-19 vaccine research
  • On the other, they are targeting small businesses

American cold storage giant Americold was hit with a cyberattack on November 16 that led them to shut down their computer systems to prevent the spread of the attack. What about small businesses?

According to a recent report, nearly 60 percent of small businesses run the risk of shut down due to damages associated with a cyber attack.

In many cases, it takes a while before the full impact of the cyberattack is determined.

2021 Cybersecurity for Business

Hackers are also diversifying the malware used in cyberattacks. Subex’s research has found a significant increase in the detection of malware belonging to crypto mining, ransomware, and predatory categories.

As holidays and year-end approaches, hackers will get even more active.

There’s a lot you can do to secure your business starting from making it tough for hackers to cause a breach all the way to outright deterring them. We are at hand to help you achieve this goal. Today, Subex is securing some of the toughest to secure businesses and critical infrastructure across 3 continents.

Nat will be glad to help in case you wish to learn more. You can drop her a line: natalie.smith@subex.com.

subexsecure iot security

Share:
Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defense tactics at close quarters.

Subscribe to Newsletter

Related Posts

Protect your IoT, OT and converged assets with Sectrio