From business email compromise to SIM ports, cyberattacks have shifted from networks to you. And it’s been an incredibly profitable pivot, with cyberhackers like GandCrab claiming earnings of $2.5M per week. How can you protect yourself when the new attack surface is your life and phishing attacks are more sophisticated than ever? In the never-ending game of cybersecurity cat-and-mouse, what trends are in the good guys’ favor? And how might both software and hardware work together to protect you and your company?
En masse, attackers are moving from these traditional targets of companies and systems and actually are focusing on you. Click To TweetSHOW NOTES
- Attacks have shifted from your company’s network to you [0:55]
- How much it costs to break into a device [2:55]
- How much it costs to hack you [3:58]
- Business email compromise (BEC) is a $26B business [4:58]
- Why BEC victims tend to be small to medium-sized businesses [5:40]
- Phishing sites have replaced malware sites as the point of access [6:38]
- Breaking down SIM port attacks (e.g. SIM swapping/jacking) [7:45]
- One of the largest tech breaches started with photos from a company BBQ [11:00]
- Enterprise-grade security as consumer products [12:4017]
- Products and services which help secure against attacks [13:30]
- Hardware keys for 2FA [15:23]
- How to set up a detection trap [16:25]
- Physical security improvements are also being consumerized [18:20]
—
The views expressed here are those of the individual AH Capital Management, L.L.C. (“a16z”) personnel quoted and are not the views of a16z or its affiliates. Certain information contained in here has been obtained from third-party sources, including from portfolio companies of funds managed by a16z. While taken from sources believed to be reliable, a16z has not independently verified such information and makes no representations about the enduring accuracy of the information or its appropriateness for a given situation.
This content is provided for informational purposes only, and should not be relied upon as legal, business, investment, or tax advice. You should consult your own advisers as to those matters. References to any securities or digital assets are for illustrative purposes only, and do not constitute an investment recommendation or offer to provide investment advisory services. Furthermore, this content is not directed at nor intended for use by any investors or prospective investors, and may not under any circumstances be relied upon when making a decision to invest in any fund managed by a16z. (An offering to invest in an a16z fund will be made only by the private placement memorandum, subscription agreement, and other relevant documentation of any such fund and should be read in their entirety.) Any investments or portfolio companies mentioned, referred to, or described are not representative of all investments in vehicles managed by a16z, and there can be no assurance that the investments will be profitable or that other investments made in the future will have similar characteristics or results. A list of investments made by funds managed by Andreessen Horowitz (excluding investments for which the issuer has not provided permission for a16z to disclose publicly as well as unannounced investments in publicly traded digital assets) is available at https://a16z.com/investments/.
Charts and graphs provided within are for informational purposes solely and should not be relied upon when making any investment decision. Past performance is not indicative of future results. The content speaks only as of the date indicated. Any projections, estimates, forecasts, targets, prospects, and/or opinions expressed in these materials are subject to change without notice and may differ or be contrary to opinions expressed by others. Please see https://a16z.com/disclosures for additional important information.