venturebeat.com Open in urlscan Pro
192.0.66.2  Public Scan

Submitted URL: https://ww2.kirkpatrickprice.com/e/22582/ss-owners-should-look-out-for-/7m5nwk/1492698379?h=Nzo0qNFeF5frSYBvP-1c_rFbO669wR20MV1rg...
Effective URL: https://venturebeat.com/datadecisionmakers/surprising-cybersecurity-weak-points-business-owners-should-look-out-for/
Submission: On October 11 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="Search">
  <input id="search-input" class="Search__input GlobalNav__text" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="Search__submit" aria-label="Search submit button">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="Search Search--mobile Nav__section--active">
  <input id="mobile-search-input" class="Search__input GlobalNav__text" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="Search__submit">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

Text Content

Skip to main content
VentureBeat Homepage
 * Events
 * GamesBeat

 * Data Pipeline
 * The MetaBeat Event

 * Account Settings
 * Log Out

 * Become a Member
 * Sign In

VentureBeat Homepage

DataDecisionMakers

 * 
 * 

VENTUREBEAT

 * AR/VR
 * Big Data
 * Cloud
 * Commerce
 * DataDecisionMakers
 * Dev
 * Enterprise
 * Entrepreneur
 * Marketing
 * Media
 * Mobile
 * Security
 * Social
 * Transportation

FOLLOW

follow us on Twitter follow us on Facebook follow us on LinkedIn Follow us on
RSS

THE MACHINE

 * AI
 * Machine Learning
 * Computer Vision
 * Natural Language Processing
 * Robotic Process Automation

FOLLOW

Follow us on RSS

GAMESBEAT

 * Games
 * Esports
 * PC Gaming

FOLLOW

follow us on Twitter Follow us on RSS

EVENTS

 * Upcoming
 * Media Partner
 * Webinars

GENERAL

 * Briefings
 * Got a news tip?
 * Advertise
 * Press Releases
 * Guest Posts
 * Contribute to DataDecisionMakers
 * Deals
 * Data Pipeline
 * Jobs
 * VB Lab
 * About
 * Contact
 * Privacy Policy

×


JOIN THE VENTUREBEAT COMMUNITY


FREE: JOIN THE VENTUREBEAT COMMUNITY FOR ACCESS TO 3 PREMIUM POSTS AND UNLIMITED
VIDEOS PER MONTH.

Learn More


SIGN UP WITH YOUR BUSINESS E-MAIL TO CONTINUE WITH TICKET PURCHASE

Please wait...


SHARE

 * Share on Facebook
 * Share on Twitter
 * Share on LinkedIn

 * VentureBeat Homepage
 * Social Links
 * Briefings
 * Events
 * Profile

Community


SURPRISING CYBERSECURITY WEAK POINTS BUSINESS OWNERS SHOULD LOOK OUT FOR

Charlie Fletcher@charlie_f365
April 17, 2022 10:10 AM
 * Share on Facebook
 * Share on Twitter
 * Share on LinkedIn

Image Credit: weerapatkiatdumrong // Getty

Learn how your company can create applications to automate tasks and generate
further efficiencies through low-code/no-code tools on November 9 at the virtual
Low-Code/No-Code Summit. Register here.

--------------------------------------------------------------------------------



Cybersecurity has taken on new levels of importance facing redoubled cyber
attacks. The post-pandemic digital landscape is fraught with threats. In fact,
these attacks peaked in December of 2021 with a slew of Log4j exploits. The
popular Java-based logging utility is only one surprising cybersecurity weak
point that business owners should look out for, however. 

Additionally, flaws in both human cybersecurity measures and protective
technology create vulnerabilities for companies. By exploring these weaknesses
in-depth, you can create actionable plans to shore up your digital integrity. 

1
/
9
Panel Discussion From Data Literacy to Proficiency: A Journey to Weave Data and
Learning into Company Culture
Read More

854.5K
4



Video Player is loading.
Play Video
Unmute

Duration 0:00
/
Current Time 0:00
Playback Speed Settings
1x
Loaded: 0%

0:00

Remaining Time -0:00
 
FullscreenPlayUp Next

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Playback Speed

0.25x
0.5x
1x Normal
1.5x
2x
Replay the list
 * Powered by AnyClip
 * Privacy Policy


TOP ARTICLES







Panel Discussion From Data Literacy to Proficiency: A Journey to Weave Data and
Learning into Company Culture


From increasingly ingenious phishing schemes to breakthroughs in offensive AI,
digital threats expose the weakness in our IT frameworks and data systems.
Identifying these weaknesses is crucial, as 85% of IT professionals pivot toward
passwordless technology. What follows are the cybersecurity vulnerabilities you
should address as a business owner. 


PHISHING, SMISHING, AND HUMAN ERROR

Phishing is one of the most nefarious and impactful forms of cyberattack,
typically drawing on fraud and social engineering to infiltrate a system.
Although business email compromise (BEC) attacks make up a small portion of all
cybercrime, the damages can be the most costly. With over $345 million in
estimated losses from these attacks, zero-trust email security systems are a
must.


EVENT

Low-Code/No-Code Summit

Join today’s leading executives at the Low-Code/No-Code Summit virtually on
November 9. Register for your free pass today.

Register Here

Now, phishing has changed to be more subtle and attackers are able to infiltrate
in ways most workers might not expect. “Smishing” or phishing with SMS texts is
one example of this. Cybercriminals send out disguised texts with links. When
employees open them, they are lured to duplicitous sites where personal
information can be obtained or rootkits installed. From here, business accounts
are subject to hacking, malware, and theft. 

IBM found that human error contributes at least partially to 95% of all data
breaches. With more convincing phishing schemes targeting businesses, these
instances of human error will only increase. For business owners, embracing
zero-trust authorization measures alongside comprehensive security training and
practices will be key to mitigating this vulnerability.

advertisement



OUTDATED SOFTWARE

After human error, outdated software can be one of your biggest cybersecurity
vulnerabilities. Failing to update a system puts you at greater risk of attack
because the older a version of unpatched software, the longer attackers have had
to determine that version’s vectors and vulnerabilities. Outdated software comes
with outdated security credentials. Wherever consumer, financial, or backend
data is concerned, the software you use to manage it presents a vulnerability
without consistent updates. 

Take the popular Customer Service Management (CMS) software Drupal 7 and 8, for
example. Both these modules are losing (or have already lost) support. Yet, many
businesses still rely on them to manage customer data. To mitigate weak points,
you need data governance plus up-to-date support. This means switching to Drupal
9 or other headless CMS platforms. 

This is just one example, however. Every software tool and data-driven platform
you use in the course of business should be kept up to date to prevent problems.
Even cryptocurrency wallets and payments systems can pose a larger threat if out
of date.

advertisement



CRYPTOCURRENCY INFILTRATION

Cryptocurrencies, their wallets, and their payment systems are often recommended
for their elevated levels of security. However, crypto tech is subject to risk
of cyber threat just like any connected technology — decentralized or not. For
exampe, cybercriminals can compromise trading platforms and steal private
information.

This means that businesses that incorporate cryptocurrency in any form must be
aware of its weak points and ideal security practices. Wherever third parties
exchange information, there’s a chance a hacker could infiltrate the system.
That’s why measures like decentralized digital identity (DDID) solutions are
emerging as a means of streamlining data ownership. The user creates their
unique identity, which comes with private keys that are checked against the
authorization process. 

Explore the vulnerabilities of any cryptocurrency practices you implement, then
strengthen your approach with comprehensive authorization tools. Artificial
intelligence is a means to achieve this — but AI can be a double-edged sword.

advertisement



OFFENSIVE AI

The power of AI to transform cyber defense has not yet reached its limitations —
if indeed it has any. However, cybercriminals are utilizing the power of AI to
go on the offensive as well. Tapping into an AI’s ability to learn and improve
through data modeling, hackers are finding new success when it comes to picking
at systems to find vulnerabilities. Emotet is one such example of a prototype
offensive AI that brute forces its way through passwords, leading to breaches in
the worst-case scenario and lost productivity through lockouts and resets in the
best case. 

These smart attacks can impersonate users, hide in the background, and tailor
attacks to specific systems. Conflicting endpoints, partial patch management,
and disparate legacy systems all increase the opportunity for offensive AI to
slip through. However, systems like the Ivanti Neurons platform are also using
AI to bridge these security gaps. 

With AI and deep learning, Ivanti and other security providers are developing
systems for IT Service Management (ITSM) that protect data through automated
configurations, remediation, and zero-trust control. Though only 8% of
businesses have adopted defensive AI like this so far, trends in AI-powered
cybersecurity are elevating business protections in meaningful ways. That said,
AI on its own is only one layer of the multifaceted defense strategies you
should employ.

advertisement



CATCHING CYBERSECURITY WEAK SPOTS

Catching cybersecurity vulnerabilities isn’t easy. It requires an expert
awareness of phishing schemes, software status, infiltration points, and
offensive tools. These weaknesses threaten the integrity of data systems and can
lead to devastating damages for businesses. As a business owner, look out for
these threats as you develop a more modern and comprehensive approach to digital
security.

Charlie Fletcher is a freelance writer covering tech and business.


DATADECISIONMAKERS

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data
work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best
practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even consider contributing an article of your own!

Read More From DataDecisionMakers




METABEAT 2022

Join metaverse thought leaders in San Francisco on October 4 to learn how
metaverse technology will transform the way all industries communicate and do
business.

Register Here




METABEAT 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse
technology will transform the way all industries communicate and do business on
October 4 in San Francisco, CA.

Register Now


JOIN FORCES WITH VENTUREBEAT AT OUR UPCOMING AI & DATA EVENTS

Sponsor VB Events
 * DataDecisionMakers
 * Follow us on Facebook
 * Follow us on Twitter
 * Follow us on LinkedIn
 * Follow us on RSS

 * VB Lab
 * Briefings
 * Events
 * Special Issue
 * Product Comparisons
 * Jobs

 * About
 * Contact
 * Careers
 * Privacy Policy
 * Terms of Service
 * Do Not Sell My Personal Information

© 2022 VentureBeat. All rights reserved.

×

We may collect cookies and other personal information from your interaction with
our website. For more information on the categories of personal information we
collect and the purposes we use them for, please view our Notice at Collection.