Interview: Cybersecurity - A Look Back and a Look Ahead
Q: Dan Svensson, Regional Manager, Admin by Request, to understand the current state of cybersecurity, let's start with a historical perspective. When did cyberattacks first emerge?
Dan Svensson, Regional Manager, Admin by Request: The first best-documented computer virus, the Elk Cloner, appeared in 1982. It spread through floppy disks, primarily targeting Apple II computers. But we should also mention the harmless test virus Creeper back in 1971 that presented only the rather funny message: “Catch me if you can”.
Q: Fascinating! How did cyber threats evolve over the years?
Dan: The landscape has definitely changed. In the 1990s, with the rise of Windows and Word, we saw malware spread through macros embedded in documents. The early 2000s brought challenges with worms infecting popular instant messaging platforms like AOL Messenger. Then, in 2013, the first widespread ransomware attacks emerged.
Q: Ransomware seems to be a major threat today. What other cybersecurity concerns should we be aware of?
Dan: Absolutely. Ransomware remains a significant concern, but it's not the only one. Malicious code, including trojans, viruses, adware, and spyware, continues to pose a threat. Social engineering, where attackers exploit human vulnerabilities to gain access to data or trick users into installing malware, is another prevalent tactic. Phishing emails are a common example of social engineering.
Q: Beyond traditional malware, what are some emerging threats in cybersecurity?
Dan: That's a great question. We're seeing a rise in attacks driven by financial motives or espionage, where criminals target sensitive data. Denial-of-service (DoS) attacks, which overwhelm systems with traffic and prevent access for legitimate users, are also a concern. Recent events like the Russia-Ukraine war have highlighted the use of DoS attacks.
Q: Disinformation seems to be another growing problem.
Dan: You're right. The spread of false information, often amplified through social media, aims to sow discord, fear, and uncertainty. Deepfakes, manipulated videos or audio recordings, further complicate the issue.
Recommended by LinkedIn
Q: With advancements in technology, could Artificial Intelligence (AI) pose a threat as well?
Dan: AI is a double-edged sword. While it offers many benefits, it can also be misused. For example, AI can be used to create deepfakes or automate attacks.
Q: Which sectors seem to be most vulnerable to cyberattacks?
Dan: According to ENISA, the EU's cybersecurity agency (2022 data), governments and authorities are the most targeted sector, followed by suppliers of digital services, society at large, critical services, banks, and healthcare – but everyone is a target.
Q: Now, let's talk about practical steps one can take to improve cybersecurity. What are your top recommendations?
Dan: Here are five key tips:
Q: Looking ahead, what can we expect in the future of cybersecurity?
Dan: The cybersecurity landscape will continue to evolve alongside technology. We need to be prepared for deepfakes, voice cloning, and AI-powered attacks. Traditional security measures like CAPTCHAs may become less reliable with AI. By staying informed and implementing strong security practices, we can navigate the ever-changing world of cybersecurity.