Blogs & Opinions 08.08.2024
The Six Biggest Cyber Threats of 2024
Reflecting on 2024 so far, the cyber danger zones can be divided into key areas.
Blogs & Opinions 08.08.2024
Reflecting on 2024 so far, the cyber danger zones can be divided into key areas.
Sometimes, it feels like cyber criminals are having a field day, devising new hacking techniques, uncovering more vulnerabilities, and watching attack surfaces grow. Of course, security teams aren’t sitting idly by. They are investing in a burgeoning collection of tools to combat all manner of threats. As a result, they become overloaded with analytics and alerts. Unable to assimilate and correlate all this disparate data easily, security teams risk missing key remediation priorities and indicators of compromise.
Replacing these piecemeal tools with fewer (but more effective) solutions requires a regular review of IT systems, applications, processes, and activities to focus efforts on the greatest threats. Reflecting on 2024 so far, the danger zones can be divided into six key areas.
While the list of security concerns is daunting, organisations can take steps to help rationalise their approach by establishing standard best practices for themselves and their third parties. A clear definition of cybersecurity policies internally can be extended to contracts with IT service providers, suppliers, and partners, including clauses on data security, breach notification, and recovery.
To avoid credential theft, implement strong access controls with multi-factor authentication across all systems, cloud services, applications, and departments. Grant only the minimum permission level required for employees and third parties to perform their jobs.
Prioritise and patch vulnerabilities promptly. This significantly reduces the attack surface. It’s critical to identify those that pose the most risk to critical systems and fix them quickly. Failure to have an established vulnerability management programme is a serious indicator of risk.
Have regular training to help employees spot phishing attempts and encourage them to report suspicious activity. Ensure malware and anomaly detection tools are in place, along with back-ups to recover quickly from attacks.
Downtime and ramifications from cyber attacks can be costly and long-term. Effective back-ups are vital to minimise data loss, enabling organisations to resume business operations in minutes or hours, rather than days or weeks.
Recovery plans should be tested and updated regularly, ideally using external resources to identify any failings.
Making these fundamentals all-inclusive internally will help build stronger cyber defences. Even so, criminals will continue to manipulate both data and people to orchestrate attacks. However, if organisations, third parties, and employees, all played their part to improve security, then the entire ecosystem would become more resilient. And life for cyber criminals wouldn’t be quite so peachy.
Darren Thomson is field chief technology officer (CTO) for EMEA & India (EMEAI) at data protection and cyber resilience company, Commvault. Thomson is helping to shape a new era of data protection and deliver industry-leading threat detection and rapid recovery capabilities.
Before joining Commvault, Thomson worked for identity and access management company, One Identity. Prior to this, he helped shape the cyber insurance industry through his work at CyberCube and Lloyds of London, after spending many years gaining experience at both Symantec and Veritas in senior executive roles.