IT disaster recovery, cloud computing and information security news

Titaniam, Inc., recently surveyed corporate security professionals to gain their predictions on cyber attack trend patterns for 2023.  Attackers are expected to broaden their targeting strategy, with large corporations expected to be the top target for cyber attacks in 2023. 41 percent of respondents expected this to be the case, with other top targets anticipated to be financial institutions (36 percent), government (14 percent), healthcare (9 percent), and education (8 percent).

The survey report, ‘Enterprise Security Priorities for 2023’, says that the fast pace of change has introduced new vulnerabilities into corporate networks, making them an increasingly attractive target for cyber attackers. To compete in the digital marketplace, large companies are adopting more cloud services, aggregating data, pushing code into production faster, and connecting applications and systems via APIs. As a result, misconfigured services, unprotected databases, little-tested applications, and unknown and unsecured APIs abound, all of which can be exploited by attackers.

Attack strategies will change in 2023

The top four threats in 2022 were malware (30 percent), ransomware and extortion (27 percent), insider threats (26 percent), and phishing (17 percent). The study found that enterprises expected malware (40 percent) to be their biggest challenge in 2023, followed by insider threats (26 percent), ransomware and related extortion (21 percent), and phishing (16 percent). Malware, however, has more enterprises worried for 2023 than it did for 2022. It is important to note that these threats can be overlapping, where insiders can have a hand in ransomware attacks, phishing can be a source of malware, etc.

Attackers are evolving their strategies in an attempt to surprise and outpace security teams, which have hardened ransomware defenses / defences and improved phishing detection. They’re using new malware, such as loaders, infostealers, and wipers to accelerate attacks, steal sensitive data and create mayhem. They’re also buying and stealing employee credentials to walk in through the front door of corporate networks.

2 in 3 companies report 2022 breaches, many see decreased dwell time

Nearly two-thirds (65 percent) of companies were breached in 2022 as attackers exploited process gaps and security vulnerabilities to access networks. While no corporate security team wants to detect a breach, they’re doing it faster, thanks to security platforms that use automation and artificial intelligence to detect anomalies amidst noise and speed up security operations processes. Among those breached, 91 percent of security operations teams detected the incident within a week, while 100 percent identified it within a month. Less hacker dwell time in networks means less damage for these companies.

However, attackers are also getting smarter. Once inside corporate networks, they move swiftly to target and exfiltrate high-value data, including data crucial to the organization (57 percent), intellectual property (57 percent), and personal identifiable information (PII) or sensitive PII (38 percent).

In 2022, structured data was more at risk than unstructured data for malicious exfiltration. Attackers targeted structured data used in databases such as Oracle and Microsoft Azure SQL Server (68 percent) and for analytics in web platforms such as Databricks (63 percent). However, attackers also searched for unstructured data used in applications (57 percent) such as Amazon S3, Microsoft Azure Blob and created by users (50 percent) in tools such as Microsoft OneDrive, Microsoft SharePoint, and others.

Moving into 2023, attackers will target structured data used for analytics (68 percent) over that used in databases (62 percent). They’ll also target unstructured data created by users (58 percent) over that created by applications (54 percent) or other sources (16 percent). Analytics and user data reveal corporate intent, providing a lens into strategies, plans, product launches, partnerships, and other information of interest to attackers, such as nation-states, cybercriminals and more.

Protecting data is the top security priority

Protecting data enables large companies to safeguard their plans and intellectual property. Thus, it’s not surprising that protecting data (31 percent) has emerged as the top security priority for 2023, ahead of preventing ransomware, data exfiltration, and extortion (27 percent), staying ahead of malicious attacks (23 percent) and other objectives. To realize this goal, 92 percent of teams plan to increase their security measures in 2023, while 97 percent will explore new solutions.

Data security rose to the top of the priority list for 2023 with over 30 percent of participants checking that as their most important upcoming project. This was followed closely by ransomware and extortion defense at over 25 percent.

Read the report.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.