WEF: Cyber Attacks are the Third Greatest Threat to the World
The World Economic Forum ranks cyber attacks third behind extreme weather and natural disasters.
Across the world, we’ve never been more connected to the internet. Our devices, our infrastructure – everything – is connected. And it’s because of this that the threat of cyber attacks and cybercrime is growing. Growing so much, in fact, that the World Economic Forum now lists “Cyber Attacks” as the third biggest threat to mankind.
If this were a trailer, I’d see that movie. Slap Dwayne Johnson and Jeff Goldblum in it for good measure. Boom. Summer blockbuster.
Unfortunately, this is real life. And according to the WEF’s Global Risks Report 2018, cyber attacks and cyber warfare sit right behind extreme weather events and natural disasters in terms of what’s likely to cause the most disruption in the next five years.
The World Economic Forum is a Swiss-based international organization concerned with improving the state of the world by “engaging business political, academic and other leaders of society to shape global, regional and industry agendas.”
Among the chief concerns listed by the WEF’s report is Ransomware, a particularly dangerous type of malware that encrypts an entire system and demands ransom in return for a key to decrypt it with. 64% of all phishing emails sent during 2017 contained ransomware. And much like the with the 2017 report, the Internet of Things is also seen as a major vulnerability, especially in light of the lack of security currently being built into most devices by their vendors.
“Cybercriminals have an exponentially increasing number of potential targets, because the use of cloud services continues to accelerate and the Internet of Things is expected to expand from an estimated 8.4 billion devices in 2017 to a projected 20.4 billion in 2020… What would once have been considered large-scale cyberattacks are now becoming normal.”
The report also cites a pair of major attacks from 2017 to highlight the dangers posed by cyber attacks. Petya cost organizations nearly $300-million while WannaCry was felt in over 150 countries, crippling infrastructure in some places.
These are mild compared to what could occur if cybercriminals decided to aim higher. “In a worst-case scenario, attackers could trigger a breakdown in the systems that keep societies functioning,” says the report.
What would that look like?
Think about something as simple as GPS. How many applications and systems are completely reliant upon GPS? What would happen if someone managed to knock that out? We’re not just talking your iPhone would stop giving you good directions, there are entire transit systems that would go haywire, air traffic would grind to a halt, who knows what else would break or go offline. Again, I’d watch that movie, but this is real life and at no point is The Rock going to show up in a helicopter to save everyone.
These are real threats.
“Geopolitical friction is contributing to a surge in the scale and sophistication of cyber attacks. At the same time cyber exposure is growing as firms are becoming more dependent on technology,” said John Drzik, president of global risk and digital at Marsh. “While cyber risk management is improving, business and government need to invest far more in resilience efforts if we are to prevent the same bulging ‘protection’ gap between economic and insured losses that we see for natural catastrophes.”
So take solace: if don’t perish in a great storm or get swallowed up by the Earth, the computers will get you.
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownA Call To Let’s Encrypt: Stop Issuing “PayPal” Certificates
in Industry Lowdown