Page 7 - index
P. 7
RESEARCH, ANALYSIS & TRENDS




4. The healthcare sector will have more stringent 6. More adoption of technologies that focus on
regulations towards ensuring uptime of computer threat actors and “hunting” for their next attack
systems handling critical operations.
Traditionally, enterprise security teams have adopted a
Globally, ransomware attacks on computer systems of “wait and see” posture, and try to build up their defens-
healthcare providers in 2016 had infected computer es to mitigate the possible threats they are aware of.
systems and disrupted operations. Hence patients in However, more enterprises are working towards trying
need of immediate attention had to be diverted to other to know what the attackers are innovating in terms of
hospitals. While major healthcare providers in Asia had cyber attack techniques, their next moves, and build up
initiatives to comply with security standards such as their defenses to counter the new attack vectors.
HIPAA, their use of legacy security tools to meet mini-
mal compliance standards could not keep up with the 7. More enterprises will offer bug bounty programs,
new types of cyber attacks. which are seen as a measure to deter talents from
taking up black hat hacking
These days, stolen personal healthcare records are
worth more in the dark web than credit card information The idea is simple yet effective: pay the attackers for
and medical machines are increasingly connected to finding and reporting major vulnerabilities in enterprise
the Internet which pose as a possible safety risk to pa- and/or developed applications. Enterprises will be able
tients. The healthcare industry needs a good ‘cyber to strengthen their security defenses through the
health check’ before it is too late. crowdsourcing model and encouraging potential hack-
ers to discover more and do more of the good rather
5. New technologies such as Blockchain may be than the bad.
used to enhance trust between stakeholders and
facilitate exchange of threat intelligence among in- 8. More drones will be used to facilitate cyber at-
dustries tacks
A group of researchers from iTrust, a Center for Re-
The setup of more Information Sharing and Analysis
Centers (ISAC) will form platforms for both the public search in Cyber Security at the Singapore University of
and private sector participants to share threat intelli- Technology and Design, demonstrated that it is possi-
gence. However, participants are wary of exposing their ble to launch a cyber attack using a drone and a
weak security posture when contributing intelligence smartphone. In the future, it is expected that drones
due to a successful attack, and there are issues of un- will be an easy way to scan for unsecured wireless traf-
trusted sources that may contribute the wrong intelli- fic as a way of performing war driving attacks.
gence. Blockchain may emerge as the technology to While more applications are developed for drones in
facilitate the exchange as it authenticates the trusted commercial use, inevitably cyber criminals will think of
party to contribute, obfuscates the contributor’s detail new techniques in launching a cyber attack. Other pos-
with anonymity, and offers a tamper proof system that sible types of attacks include delivering GPS jamming
prevents unauthorized alteration of any data shared. signals to a vessel or dropping USB drives containing
malware to air-gapped critical infrastructures. ◊

By Frost & Sullivan Asia Pacific



























MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   2   3   4   5   6   7   8   9   10   11   12