
Verizon recently released its 2022 Data Breach Investigations Report, giving businesses vital insights into the state of cybersecurity around the world. It contains an analysis of over 23,000 incidents and 5,200 confirmed breaches, analysed over the past. Overall, Verizon attributes the number-one motive of cyberattacks to financial gain, saying almost four out of five breaches were attributable to organised crime seeking to extort businesses of hefty ransomware sums, backed by insurance pay-out.
In the report, Verizon estimates that there has been a 13% increase in ransomware breaches – this is more than in the last 5 years combined. Additionally, 82% of cyber breaches involved a human element, namely through stolen credentials, phishing, misuse or simply an error.
Verizon states that people continue to play a very large role in incidents and breaches alike. This year 18% of clicked phishing emails are also said to come directly from a mobile phone, highlighting it as a weakness for business security. Verizon argues that their statistics highlight the importance of having a strong security awareness program.
Julia O’Toole, Founder and CEO of MyCena Security Solutions, believes that this report outlines the desperate need for private businesses and public organisations to change their cybersecurity approach. Improving security awareness is good, but directly addressing a problem which has persisted uncontested for nearly two decades is better.
“For 15 years, the vast majority of cyber-attacks and network breaches have happened through credential-based logins. Credentials, specifically their theft and misuse, have long been the elephant in the room, causing over 80% of breaches year after year. Yet for all this time, the cybersecurity industry has not fixed the root cause of the problem. Instead, efforts and investments in cybersecurity only focused on the remaining 1/5 of breaches – from infrastructure and software vulnerabilities – most of which remain undetected.
In the meantime, organizations have continued to blame their employees for poor password hygiene or failing phishing attacks. Placing the main cybersecurity problem on employees’ shoulders also had the pernicious effect of companies making hazardous decisions. For example, organizations that converted to single access to make user login easier had mechanically knocked down obstacles for criminals and reduced their cyber resilience. They in effect created a golden path for criminals to access, scan and find privileged access or “main switch” to lock the entire network, which in turn accelerated their workflow and reduced by 94.34% the time between initial access to ransomware from more than 2 months to 3.85 days between 2019 and 2021.
“Investing billions of dollars in cybersecurity may have had the reverse effect on organisations’ cyber-resilience, as they took down layers of security for users’ convenience. This could explain why Verizon’s report shows organisations are now less safe than 15 years ago. In the same vein, US National Cyber Director Chris Inglis recently asked the administration and federal agencies to ‘transform the way they approach and invest in cybersecurity’, as previous efforts have clearly ‘not worked’.”
O’Toole believes that businesses are not to blame when it comes to these issues, although it is their responsibility to educate themselves and start addressing this root issue as soon as possible. “Most companies let their employees control the access credentials to their infrastructure and assets. That is essentially giving up control of access from day one. When someone else controls your company’s digital keys, you are no longer in charge of what happens to them – whether they are weak, reused, shared, sold, phished – and blinded from both external and internal threats across the entire surface of your organisation. From a legal standpoint, companies may have also put themselves in breach of data privacy laws such as GPDR, HIPAA, CCPA or LGDP, since not having control, possession and custody of the access keys to your data means not having control, possession and custody of the data itself. Reclaiming credentials ownership, therefore, is essential and should be a priority.”
“In the absence of physical obstacles to credentials theft, the most effective measure to address and secure that 82% is to use end-to-end encrypted credentials, from creation, distribution, storage, use, to expiry. Companies simply encrypt and distribute access credentials to all systems to their users inside a secure place only each user can access. Because you cannot give information you don’t have, as long as people use credentials without seeing or knowing them, organisations stay in control of their access.”
“Encrypting access also gives back to organisations the control and responsibility for their cybersecurity, which no longer rests on the employees’ shoulders. By re-enabling network access segmentation, companies are also able to improve their overall cyber-resilience and limit the impact of any breach”
“Since the first Verizon report, organisations have been doing the same thing and hoping for a different result. Fifteen years on, it is time for them to fix those credentials-based breaches once and for all.”
Fachartikel

ChatGPT bei der Arbeit nutzen? Nicht immer eine gute Idee

Das Aktualisieren von Software-Agenten als wichtige Praktik der Cyberhygiene auf MSP-Seite

Kosteneinsparungen und Optimierung der Cloud-Ressourcen in AWS

CVE-2023-23397: Der Benachrichtigungston, den Sie nicht hören wollen

Wie sich kleine und mittlere Unternehmen proaktiv gegen Ransomware-Angriffe wappnen
Studien

Studie zeigt 193 Millionen Malware-Angriffe auf Mobilgeräte von Verbrauchern im EMEA-Raum

2023 State of the Cloud Report

Trotz angespannter Wirtschaftslage: die Security-Budgets steigen, doch der IT-Fachkräftemangel bleibt größte Hürde bei Erreichung von Security-Zielen

BSI-Studie: Viele Software-Produkte für Onlineshops sind unsicher

Wie Cloud-Technologie die Versicherungsbranche revolutioniert
Whitepaper

Aufkommende Trends in der externen Cyberabwehr

Cyber-Sicherheit für das Management – Handbuch erhöht Sicherheitsniveau von Unternehmen

Aktueller Datenschutzbericht: Risiko XXL am Horizont

Vertrauen in die Lieferkette durch Cyber-Resilienz aufbauen

TXOne Networks und Frost & Sullivan veröffentlichen Jahresbericht 2022 über aktuelle Cyberbedrohungen im OT-Bereich
Unter4Ohren

Optimierung der Cloud-Ressourcen und Kosteneinsparungen in AWS

DDoS – der stille Killer

Continuous Adaptive Trust – mehr Sicherheit und gleichzeitig weniger mühsame Interaktionen

Datenschutz und -kontrolle in jeder beliebigen Cloud bei gleichzeitiger Kostensenkung, Reduzierung der Komplexität, Verbesserung der Datenverfügbarkeit und Ausfallsicherheit
