Interview: Cybersecurity - A Look Back and a Look Ahead
An interview with Dan Svensson from Admin by Request

Interview: Cybersecurity - A Look Back and a Look Ahead

Q: Dan Svensson, Regional Manager, Admin by Request, to understand the current state of cybersecurity, let's start with a historical perspective. When did cyberattacks first emerge?

Dan Svensson, Regional Manager, Admin by Request: The first best-documented computer virus, the Elk Cloner, appeared in 1982. It spread through floppy disks, primarily targeting Apple II computers. But we should also mention the harmless test virus Creeper back in 1971 that presented only the rather funny message: “Catch me if you can”.

Q: Fascinating! How did cyber threats evolve over the years?

Dan: The landscape has definitely changed. In the 1990s, with the rise of Windows and Word, we saw malware spread through macros embedded in documents. The early 2000s brought challenges with worms infecting popular instant messaging platforms like AOL Messenger. Then, in 2013, the first widespread ransomware attacks emerged.

Q: Ransomware seems to be a major threat today. What other cybersecurity concerns should we be aware of?

Dan: Absolutely. Ransomware remains a significant concern, but it's not the only one. Malicious code, including trojans, viruses, adware, and spyware, continues to pose a threat. Social engineering, where attackers exploit human vulnerabilities to gain access to data or trick users into installing malware, is another prevalent tactic. Phishing emails are a common example of social engineering.

Q: Beyond traditional malware, what are some emerging threats in cybersecurity?

Dan: That's a great question. We're seeing a rise in attacks driven by financial motives or espionage, where criminals target sensitive data. Denial-of-service (DoS) attacks, which overwhelm systems with traffic and prevent access for legitimate users, are also a concern. Recent events like the Russia-Ukraine war have highlighted the use of DoS attacks.

Q: Disinformation seems to be another growing problem.

Dan: You're right. The spread of false information, often amplified through social media, aims to sow discord, fear, and uncertainty. Deepfakes, manipulated videos or audio recordings, further complicate the issue.

Q: With advancements in technology, could Artificial Intelligence (AI) pose a threat as well?

Dan: AI is a double-edged sword. While it offers many benefits, it can also be misused. For example, AI can be used to create deepfakes or automate attacks.

Q: Which sectors seem to be most vulnerable to cyberattacks?

Dan: According to ENISA, the EU's cybersecurity agency (2022 data), governments and authorities are the most targeted sector, followed by suppliers of digital services, society at large, critical services, banks, and healthcare – but everyone is a target.

Q: Now, let's talk about practical steps one can take to improve cybersecurity. What are your top recommendations?

Dan: Here are five key tips:

  1. Principle of Least Privilege (POLP): Grant users the minimum level of access required for their tasks. This limits potential damage from compromised accounts.
  2. Regular Backups: Implement a consistent backup routine, including what data is backed up, how often, and how to recover data in case of an attack. Offline backup is a must since the backup is also a target for attacks.
  3. Whitelisting: Define authorized applications and restrict unauthorized programs from running on devices.
  4. Network Monitoring: Monitor network activity in real-time to detect and respond to threats quickly.
  5. Stay Informed: Keep up-to-date on evolving cyber threats and adapt your security practices accordingly.

Q: Looking ahead, what can we expect in the future of cybersecurity?

Dan: The cybersecurity landscape will continue to evolve alongside technology. We need to be prepared for deepfakes, voice cloning, and AI-powered attacks. Traditional security measures like CAPTCHAs may become less reliable with AI. By staying informed and implementing strong security practices, we can navigate the ever-changing world of cybersecurity.


 

To view or add a comment, sign in

More articles by Ideon Science Park

Insights from the community

Others also viewed

Explore topics