{"id":438,"date":"2017-12-28T23:27:55","date_gmt":"2017-12-28T23:27:55","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/"},"modified":"2019-05-29T11:52:12","modified_gmt":"2019-05-29T11:52:12","slug":"cybersecurity-review-of-2017-the-year-of-wake-up-calls","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/","title":{"rendered":"Cybersecurity review of 2017: The year of wake-up calls"},"content":{"rendered":"<p class=\"wls-paragraph\">In the second part of our cybersecurity review of 2017 we look back at some of the key events that took place throughout a very busy year. If you missed part one of our review you can catch up <a href=\"https:\/\/www.welivesecurity.com\/2017\/12\/27\/cybersecurity-review-2017-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<h2><strong>Data (in)security<\/strong><\/h2>\n<p class=\"wls-paragraph\">Recent figures from Gemalto\u2019s Breach Level Index for the <a href=\"https:\/\/www.gemalto.com\/press\/Pages\/First-Half-2017-Breach-Level-Index-Report-Identity-Theft-and-Poor-Internal-Security-Practices-Take-a-Toll.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">first half of 2017<\/a> show a troubling trend and suggest that data breaches are increasingly pervasive and the volume of impacted records is rising in sync. A total of 918 data breaches resulted in the compromise of 1.9 billion data records worldwide in the first half of 2017, with the number of lost, stolen or compromised records up 164% from the second half of 2016. The US remains home to an overwhelming majority of data breaches.<\/p>\n<p class=\"wls-paragraph\">It is safe to say that the data theft at the credit reporting agency Equifax stole the show in \u2018standalone\u2019 data breaches this year. The <a href=\"https:\/\/www.welivesecurity.com\/2017\/09\/08\/equifax-hack-half-us-population-affected\/\" target=\"_blank\" rel=\"noopener noreferrer\">Equifax hack<\/a>, truly a tale of woe for all its victims, along with the firm\u2019s bungling of \u2018picking up the pieces\u2019 after discovering the incident, highlighted general concerns about data handling and privacy.<\/p>\n<p class=\"wls-paragraph\">While not necessarily the largest in terms of records compromised, Equifax\u2019s \u2018mother of all breaches\u2019 in 2017 was notable for the kind of information exposed. Indeed, <a href=\"http:\/\/breachlevelindex.com\/data-breach-database.php?range=2017\" target=\"_blank\" rel=\"noopener noreferrer\">data breaches<\/a> may be a sad fact of digital life, but it\u2019s not every day that information such as the social security numbers of one in every two Americans is stolen.<\/p>\n<p class=\"wls-paragraph\">That is, unless we consider \u201c<a href=\"http:\/\/www.businessinsider.com\/deep-root-leaks-voter-data-russia-2017-6\" target=\"_blank\" rel=\"noopener noreferrer\">the mother lode of all leaks<\/a>\u201d, in which data-analytics firm Deep Root Analytics accidentally leaked personal information on 198 million American voters halfway into this year, in what is believed to be the single biggest leak of voter records worldwide. A mere few days ago, it emerged that US citizens were \u2018treated\u2019 to <a href=\"http:\/\/www.zdnet.com\/article\/alteryx-s3-leak-leaves-120m-american-households-exposed\/\" target=\"_blank\" rel=\"noopener noreferrer\">another leak<\/a> of sensitive information, this time impacting 123 million American households.<\/p>\n<p class=\"wls-paragraph\">Meanwhile, Yahoo, which isn\u2019t new to dropping bombshells, <a href=\"https:\/\/www.oath.com\/press\/yahoo-provides-notice-to-additional-users-affected-by-previously\/\" target=\"_blank\" rel=\"noopener noreferrer\">admitted<\/a> in October that one of its two massive breaches \u2013 back in August 2013 \u2013 affected all three billion user accounts on the service, rather than the previously disclosed one billion accounts. The access credentials exposed can be used for large-scale automated attacks called \u2018<a href=\"http:\/\/www.securityweek.com\/credential-stuffing-successful-and-growing-attack-methodology\" target=\"_blank\" rel=\"noopener noreferrer\">credential stuffing<\/a>\u2019, in which miscreants leverage names and passwords belonging to one account in order to invade the same user\u2019s other account(s), notably in banks, given the well-known penchant of netizens for re-using their passwords for many accounts.<\/p>\n<h2><strong>Vulnerabilities<\/strong><\/h2>\n<p class=\"wls-paragraph\">The importance of plugging security holes was also made clear this year, as many of the worst incidents would have been prevented, had the systems been patched and had proper security practices been followed. A number of vulnerabilities came under scrutiny this year, but none had as lasting an impact as those exploited by threat actors who co-opted the batch of tools developed by the NSA and stolen and leaked by Shadow Brokers.<\/p>\n<p class=\"wls-paragraph\">Another fundamental vulnerability to grab headlines this year \u2013 although not for being widely exploited \u2013 concerned the WPA2 encryption protocol. \u2018<a href=\"https:\/\/www.welivesecurity.com\/2017\/10\/16\/wpa2-security-issues-pose-serious-wi-fi-safety-questions\/\" target=\"_blank\" rel=\"noopener noreferrer\">KRACK<\/a>\u2019 or Key Reinstallation AttaCK \u2013 which has since the disclosure in October been patched across all major platforms \u2013 enabled third parties to eavesdrop on network traffic as long as they were within range of the victim\u2019s Wi-Fi. As a result, private conversations might have no longer been so private in some circumstances.<\/p>\n<p class=\"wls-paragraph\">Various implementations of the Bluetooth standard grappled with their own potentially high-impact <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/09\/bluetooth-bugs-open-billions-of-devices-to-attacks-no-clicking-required\/\" target=\"_blank\" rel=\"noopener noreferrer\">set of flaws<\/a> that put the users of almost all operating systems at risk. In September&nbsp;it surfaced that pretty much any Bluetooth-enabled device that hadn\u2018t been recently patched could be taken over, even if not paired with the hacker\u2019s device.<\/p>\n<p class=\"wls-paragraph\">As more and more devices, primarily from the IoT arena, are being connected to the internet, the attack surface is expanding at an alarming rate. And so do holes in security: <a href=\"https:\/\/www.cvedetails.com\/browse-by-date.php\" target=\"_blank\" rel=\"noopener noreferrer\">reported vulnerabilities<\/a> in 2017 more than doubled over those reported in 2016.<\/p>\n<h2><strong>Critical infrastructure in critical danger?<\/strong><\/h2>\n<p class=\"wls-paragraph\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/12\/cybersecurity_reviewInfra-2.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-105751\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/12\/cybersecurity_reviewInfra-2-300x145.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/12\/cybersecurity_reviewInfra-2-300x145.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/12\/cybersecurity_reviewInfra-2-768x370.jpg 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/12\/cybersecurity_reviewInfra-2.jpg 1000w\" alt=\"\" width=\"640\" height=\"308\"><\/a><\/p>\n<p class=\"wls-paragraph\">The <a href=\"https:\/\/www.welivesecurity.com\/2016\/06\/07\/infrastructure-attacks-next-generation\/\" target=\"_blank\" rel=\"noopener noreferrer\">critical infrastructure<\/a> ecosystem has been revealed as an orchard abundant in low-hanging fruit, as fundamental weaknesses kept coming to light this year. The urgency of threats faced by key infrastructure was laid bare again just a few days into 2017, as researchers <a href=\"http:\/\/www.bbc.com\/news\/technology-38573074\" target=\"_blank\" rel=\"noopener noreferrer\">concluded<\/a> that a power outage that had caused an hour-long blackout in parts of and outside the Ukrainian capital of Kiev on December 17, 2016, had been caused by a cyberattack.<\/p>\n<p class=\"wls-paragraph\">ESET researchers later dived deep into samples of malware detected by ESET as <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/12\/industroyer-biggest-threat-industrial-control-systems-since-stuxnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">Win32\/Industroyer<\/a>only to conclude that the malicious code had most probably been used in the December 2016 incursion. Courtesy of its highly customizable nature \u2013 along with its ability to persist in the system and to provide valuable information for fine-tuning the highly configurable payloads \u2013 the malware can be adapted for attacks against any environment, making it extremely dangerous.<\/p>\n<p class=\"wls-paragraph\">The December 2016 attack was reminiscent of a similar, but much bigger cyberattack-induced <a href=\"https:\/\/www.welivesecurity.com\/2016\/01\/04\/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry\/\" target=\"_blank\" rel=\"noopener noreferrer\">power outage<\/a> on 23 December 2015. That one left around half of the homes in the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ivano-Frankivsk_Oblast\" target=\"_blank\" rel=\"noopener noreferrer\">Ivano-Frankivsk region<\/a>, populated by 1.4 million people, without electricity for several hours, in a first-of-its-kind attack that leveraged malware known as BlackEnergy.<\/p>\n<p class=\"wls-paragraph\">ESET Senior Malware Researcher Robert Lipovsk\u00fd has voiced concern that Ukraine may serve as a blueprint for refining attacks on critical infrastructure that could be unleashed in other parts of the world. \u201cThe relatively low impact of December 2016\u2019s blackout stands in great contrast to the technical level and sophistication of the suspected malware behind Industroyer,\u201d he stated.<\/p>\n<p class=\"wls-paragraph\">In October, the US government issued a rare <a href=\"https:\/\/www.welivesecurity.com\/2017\/10\/22\/us-warns-ongoing-attacks-energy-firms-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer\">public warning<\/a> that \u201csince at least May 2017, threat actors have targeted government entities and the energy, water, aviation, nuclear, and critical manufacturing sectors, and, in some cases, have leveraged their capabilities to compromise victims\u2019 networks\u201d.<\/p>\n<p class=\"wls-paragraph\">In a \u201c<a href=\"https:\/\/www.reuters.com\/article\/us-cyber-infrastructure-attack\/hackers-halt-plant-operations-in-watershed-cyber-attack-idUSKBN1E8271\" target=\"_blank\" rel=\"noopener noreferrer\">watershed cyberattack<\/a>\u201d disclosed earlier this month, threat actors recently used malware called Triton to take out the safety system of an industrial plant in the Middle East, resulting in the halting of the facility\u2019s operations. While this was the first report of a safety system compromise at a critical infrastructure facility, the incident brought back memories of <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/19\/industroyer-interview-ics-developed-decades-ago-no-security-mind\/\" target=\"_blank\" rel=\"noopener noreferrer\">Industroyer<\/a> and <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/16\/seven-years-stuxnet-industrial-systems-security-spotlight\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a>.<\/p>\n<p class=\"wls-paragraph\">Meanwhile, the health care sector remains ailing as far as its own cyber-defenses are concerned. It has for long been a juicy target, not least because it stores a variety of sensitive personal records that often need to be accessed quickly.<\/p>\n<p class=\"wls-paragraph\">Just how much havoc can be wrought by a cyberattack at health care facilities, regardless of whether it is targeted or not, was best exemplified by the damage that WannaCryptor inflicted on the United Kingdom\u2019s National Health Service (NHS). The assault is claimed to have hobbled one in three NHS organizations in England. As a result, 19,500 medical appointments were cancelled, computers at 600 GP surgeries were locked, and five hospitals had to divert ambulances elsewhere.<\/p>\n<p class=\"wls-paragraph\">It was later announced that the NHS would receive a shot in the arm worth \u00a320 million with an eye to boosting its immunity from similar incursions. In some ways, this represents a departure from the long-term trend in the industry, which in general has been incorporating more and more devices, each linked with confidential information and in many cases IoT functionality, while security and privacy have, as usual, remained an afterthought.<\/p>\n<h2><strong>Denouement<\/strong><\/h2>\n<p class=\"wls-paragraph\">With 2017 now almost in the rear view mirror, the dictum that even the best security can be outflanked by the weakest link in the security chain still holds true for cyberspace. As has been repeated <em>ad nauseam <\/em>\u2013 and even though it may not necessarily be applicable in all incidents \u2013 the human factor is usually the soft underbelly. Which is actually where high-profile attacks and breaches help as, among other things, they highlight vulnerabilities in the ways in which our personal information is handled. More broadly, the current threatscape lays bare the perils of our reliance on assailable technology and is a reminder of just how vital cybersecurity is amid the convergence of our digital and physical worlds.<\/p>\n<p class=\"wls-paragraph\">Before we close the books on 2017, we have many lessons to derive from the events of the past 12 months as an undoubtedly hectic 2018 beckons. As increasing proportions of our lives take place in the online realm \u2013 and often with scant awareness on our part at that \u2013 the urgency of protecting our digital lives is now greater than ever. For starters, we need to give ourselves the opportunity to stay ahead of miscreants, who are innovating with alacrity and stand ready to exploit any weakness. We would be remiss in thinking that \u2018it can\u2019t happen to me\u2019. Instead, learning from mistakes made by others\u2014before those same mistakes are exploited against us\u2014goes a long way towards maintaining and improving our defenses. That way, we lessen the likelihood that cyber-insecurity becomes an ongoing and undiagnosed problem that may come back to bite us and erode the value of not only our digital life, but our physical being as well.<\/p>\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2017\/12\/28\/cybersecurity-review-2017-part-2\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the second part of our cybersecurity review of 2017 we look back at some of the key events that took place throughout a very busy year. If you missed part one of our review you can catch up here. Data (in)security Recent figures from Gemalto\u2019s Breach Level Index for the first half of 2017<\/p>\n","protected":false},"author":5,"featured_media":1951,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[148],"tags":[],"class_list":["post-438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity review of 2017: The year of wake-up calls - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity review of 2017: The year of wake-up calls\" \/>\n<meta property=\"og:description\" content=\"In the second part of our cybersecurity review of 2017 we look back at some of the key events that took place throughout a very busy year. If you missed part one of our review you can catch up here. Data (in)security Recent figures from Gemalto\u2019s Breach Level Index for the first half of 2017\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-28T23:27:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T11:52:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/cybersecurity_review2-623x432.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Cybersecurity review of 2017: The year of wake-up calls\",\"datePublished\":\"2017-12-28T23:27:55+00:00\",\"dateModified\":\"2019-05-29T11:52:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/\"},\"wordCount\":1472,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/cybersecurity_review2-623x432.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/\",\"name\":\"Cybersecurity review of 2017: The year of wake-up calls - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/cybersecurity_review2-623x432.jpg\",\"datePublished\":\"2017-12-28T23:27:55+00:00\",\"dateModified\":\"2019-05-29T11:52:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/cybersecurity_review2-623x432.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/cybersecurity_review2-623x432.jpg\",\"width\":623,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity review of 2017: The year of wake-up calls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/12\\\/28\\\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity review of 2017: The year of wake-up calls - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity review of 2017: The year of wake-up calls","og_description":"In the second part of our cybersecurity review of 2017 we look back at some of the key events that took place throughout a very busy year. If you missed part one of our review you can catch up here. Data (in)security Recent figures from Gemalto\u2019s Breach Level Index for the first half of 2017","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-12-28T23:27:55+00:00","article_modified_time":"2019-05-29T11:52:12+00:00","og_image":[{"width":623,"height":432,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/cybersecurity_review2-623x432.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Cybersecurity review of 2017: The year of wake-up calls","datePublished":"2017-12-28T23:27:55+00:00","dateModified":"2019-05-29T11:52:12+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/"},"wordCount":1472,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/cybersecurity_review2-623x432.jpg","articleSection":["cybersecurity"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/","name":"Cybersecurity review of 2017: The year of wake-up calls - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/cybersecurity_review2-623x432.jpg","datePublished":"2017-12-28T23:27:55+00:00","dateModified":"2019-05-29T11:52:12+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/cybersecurity_review2-623x432.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/cybersecurity_review2-623x432.jpg","width":623,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity review of 2017: The year of wake-up calls"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/12\/28\/cybersecurity-review-of-2017-the-year-of-wake-up-calls\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=438"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1951"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}