As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and services.
But cybercriminals know this—in fact, they’re counting on it. McAfee Labs’ September 2016 Threat Report reveals that scammers are targeting people, attacking their data more than ever. It’s become easier for them to steal this information, and the report even states that “personal data about customers or employees now makes up the majority of reported breaches, with payments coming in a distant third.”
But why does this happen? Shouldn’t technological advances make us more secure? Truth be told, new vehicles for sharing personal data can also be a treasure trove for criminals.
We’re living in an age where mobile devices, cloud-based sharing platforms, and social media are the norm. That’s largely why personal data has become a big target . But it’s important to remember that new technology invites threats, just like old technology. It’s all about ease of access: when attackers detect flaws in a cybersecurity system (old or new), they’re drawn in.
One of cybercriminals’ new targets, believe it or not, is medical records. Hospital software is more outdated than you might think. But criminals go deeper than consumers, and they’ve taken advantage of weaknesses, especially over the past year. This year, hospitals have become a major target for ransomware , with one cybercriminal even earning $121 million from a handful of campaigns targeting hospitals.
This increase in ransomware attacks on the healthcare sector is no coincidence. It’s due to the outdated infrastructure required to remain operational at all times. These systems, which struggle to integrate new cybersecurity technologies with outdated systems, are a target.
Because hospitals contain repositories of personalized data, many thieves also target consumers directly. Age isn’t the only factor; new technologies are also being exploited. Take social media, for example. It provides thieves with a new source to target and enhance phishing attacks .
Other new platforms, such as cloud computing technologies, are also more difficult to protect using older methods. As people spend more time on mobile devices, scammers are capitalizing on that space as well. During the second quarter of 2016 alone, the number of new mobile malware samples was the highest ever recorded, with two million samples.
The moral of the story is this: personal data is being hunted. Thieves are finding security holes in both new and old technologies to extract the most private information.
But luckily, there are solutions. Security is also thinking ahead. The industry is constantly looking for innovative ways to keep people safe. As the latest McAfee Labs Threat Report indicates, the number of internet-connected devices and the volume of data are increasing every year. This allows analytics to slowly become the primary approach to disrupting incoming attacks. From data science to machine learning, we can expect more cutting-edge security solutions every day.
In fact, we’ve already started. With the launch of McAfee Next Generation Anti-Malware Engine, the cornerstone of our new consumer security line, we’re using behavioral analysis and machine learning to better detect threats. This new solution, along with our other product updates, ensures that your mobile, cloud-connected, and wearable devices remain secure.
Consejos para protegerte
In the meantime, to keep your personal data safe, here are some tips to protect yourself:
It’s time for an update. Don’t let your own records become obsolete. It’s essential to avoid having old and vulnerable software. Update your devices’ operating systems to the latest versions. Very often, software updates come with security updates.
Keep security in mind when purchasing new technology or accessing a website. Do a quick Google search for a product before taking it home, and make sure it’s rated as secure. Also, check what security settings it has. If you’re unsure whether a website is vulnerable, you can use the True Key app to log in securely.
Back up everything and be ready for removal. When breaches occur, damage control is necessary. Having your account information can help you communicate with the teams responsible for security. So keep copies on an external hard drive. That way, if a breach occurs, you won’t lose everything. And if malware is deployed, our new Virus Protection Pledge products guarantee permanent virus removal.
And of course, stay ahead of the latest mobile and consumer security threats by following us, like us @McAfee on Twitter, and liking us on Facebook .