share_log

Baker Tilly's Insights on the Key Cybersecurity Trends From Industry-Leading Reports

Baker Tilly's Insights on the Key Cybersecurity Trends From Industry-Leading Reports

贝克·蒂利对行业领先报告中的关键网络安全趋势的见解
Accesswire ·  05/22 09:15

NORTHAMPTON, MA / ACCESSWIRE / May 22, 2024 / Baker Tilly
Authored by Mike Vanderbilt, Mike Cullen

马萨诸塞州北安普敦/ACCESSWIRE/2024 年 5 月 22 日/Baker Tilly
由迈克·范德比尔特、迈克·卡伦撰写

As children, we all had our bogeyman. Whatever it was that frightened us, we understood that as we grew older - and stronger, and more knowledgeable - those bogeymen, conversely, would become less frightening.

小时候,我们都有自己的忌人。不管是什么让我们感到恐惧,我们都知道,相反,随着年龄的增长,越来越强大,知识越来越丰富,那些忌人会变得不那么可怕。

Not so in the world of cybersecurity. Unfortunately, it has proven much more difficult to outgrow the risks of real-world cyber criminals than it was the make-believe monsters that once lived in our closets.

在网络安全世界中并非如此。不幸的是,事实证明,要摆脱现实世界中网络犯罪分子的风险要比曾经生活在我们壁橱里的虚构怪物要困难得多。

As our knowledge and experience in the cyber world increases, the various bogeymen we now face only grow bigger, stronger and faster. Bad actors are simply more capable of wreaking more havoc more quickly than ever before. A cyberattack that used to take weeks to unfold now occurs in a matter of days. Yesterday's adequate defenses quickly become today's visible but ineffective security facades-the cyber equivalent of pulling the covers over one's head and hoping for the best.

随着我们在网络世界中的知识和经验的增加,我们现在面临的各种忌人只会变得更大、更强大、更快。不良行为者比以往任何时候都更有能力更快地造成更大的破坏。过去需要数周才能展开的网络攻击现在会在几天之内发生。昨天的充足防御措施很快就变成了当今显而易见但无效的安全面孔——这等同于掩盖头顶,希望获得最好的结果。

Unfortunately, this reality is turning many organizations into mere statistics. As reflected in an extensive collection of recent cyber reports spanning myriad industries, the trouble often boils down to two main culprits: innovative external threat actors and an increase in human error.

不幸的是,这种现实使许多组织变成了仅仅是统计数据。正如最近涵盖各行各业的大量网络报告所反映的那样,麻烦通常归结为两个主要罪魁祸首:创新的外部威胁行为者和人为错误的增加。

External threat actors

外部威胁行为者

According to Verizon's Data Breach Investigations Report (DBIR) - an industry staple, providing in-depth analysis and information about security incidents and data breaches - 65% of breaches were the result of external threat actors and 35% (an increase of 20% over the prior year) were attributed to individuals within the organization. Yes, the external bogeymen are still on the scene and have grown more creative and aggressive. But we must also worry about our own employees exposing our systems and data or otherwise leaving us vulnerable to attack.

根据Verizon的数据泄露调查报告(DBIR)(该报告是行业主要报告,提供有关安全事件和数据泄露的深入分析和信息),65%的泄露是由外部威胁行为者造成的,35%(比上年增长20%)归因于组织内部的个人。是的,外部的柏忌人仍在现场,并且变得更具创造力和侵略性。但是,我们还必须担心自己的员工会暴露我们的系统和数据,或者以其他方式使我们容易受到攻击。

Consider CrowdStrike's Global Threat Report which provides threat intelligence and an overview of the tactics, techniques and procedures (TTPs) used by cyber adversaries. Their 2023 report highlights a variety of TTPs at work, including identity-based attacks (emphasizing the importance of protecting user credentials), the surge of cloud intrusions (as noted by a 75% increase in cloud environment intrusions from 2022 to 2023), third-party exploitation (documenting the risk continually posed by supply chain vulnerabilities) and even malware-free attacks (which increased by 60% in 2023) as adversaries adopt more subtle methods like credential phishing and social engineering.

以CrowdStrike的全球威胁报告为例,该报告提供了威胁情报并概述了网络对手使用的战术、技术和程序(TTP)。他们的2023年报告重点介绍了各种正在起作用的TTP,包括基于身份的攻击(强调保护用户凭证的重要性)、云入侵的激增(从2022年到2023年云环境入侵增加了75%)、第三方利用(记录供应链漏洞持续构成的风险),甚至是无恶意软件攻击(在2023年增加了60%),因为对手采用了更微妙的方法,例如凭据网络钓鱼和社会工程。

And yet, the bogeyman gets worse. It's not just that these external threat actors are evermore present and aggressive, and that their attacks grow evermore diverse and complex - but that these attacks are also becoming evermore expensive.

但是,那个忌人变得更糟了。不仅仅是这些外部威胁行为者比以往任何时候都更加存在和侵略性,他们的攻击变得越来越多样和复杂,而且这些攻击也变得越来越昂贵。

Documenting the financial implications of data breaches, IBM's Cost of a Data Breach Report 2023, highlights that the global average cost of a data breach in 2023 was $4.45 million-an increase of 2.3% from 2022 and an astonishing 15.3% from 2020. Those numbers get worse when you dive deep into specific industries (a 53.3% increase, since 2020, in healthcare data breach costs) and/or specific victims (a 22% increase in losses, from 2022, for the American public, according to the FBI: Internet Crime Complain Center (IC3) Report).

IBM的《2023年数据泄露成本报告》记录了数据泄露的财务影响,强调2023年数据泄露的全球平均成本为445万美元,比2022年增长了2.3%,比2020年增长了惊人的15.3%。当你深入研究特定行业(自2020年以来,医疗数据泄露成本增长了53.3%)和/或特定受害者(根据联邦调查局:互联网犯罪投诉中心(IC3)报告,自2022年起,美国公众的损失增加了22%)时,这些数字就会变得更糟。

Bigger, faster, stronger - and more expensive to boot. The external threat actors of the cyber world continue to grow more capable and more dangerous with each passing day.

更大、更快、更强——而且启动成本更高。网络世界的外部威胁行为者的能力不断增强,危险性与日俱增。

Human element

人为元素

But these collective cybersecurity reports highlight a second trend continuing from recent years-an increase in human error (most notable through the breakdown of internal controls).

但是这些集体网络安全报告突显了近年来延续的第二个趋势——人为错误的增加(最明显的是内部控制的崩溃)。

That same DBIR piece details how "74% of all breaches include the human element, with people being involved either via error, privilege misuse, use of stolen credentials or social engineering."

DBIR的同一篇文章详细介绍了 “所有违规行为中有74%包含人为因素,人们通过错误、滥用权限、使用被盗凭据或社会工程学参与其中。”

And while the extent of human-centered vulnerabilities is difficult to quantify, three main weaknesses were identified by the Unit 42: Ransomware and Extortion Report, including: "unpatched vulnerabilities, lack of consistent controls across the organization and unauthorized use of legitimate access credentials." It comes as no surprise that 92% of industries consider ransomware a top threat.

尽管以人为本的漏洞的程度难以量化,但Unit 42确定了三个主要弱点:勒索软件和勒索报告,包括:“未修补的漏洞、整个组织缺乏一致的控制以及未经授权使用合法访问凭证。”92%的行业将勒索软件视为最大威胁也就不足为奇了。

There is a positive note, however, regarding the weaknesses of the human element in these cyber reports. Organizations are responding. IBM's Cost of a Data Breach Report found that 51% of organizations are "planning to increase security investments as a result of a breach ... [including] areas such as incident response (IR) planning and testing, employee training and threat detection and response technologies."

但是,对于这些网络报告中的人为因素的弱点,有一个积极的看法。各组织正在做出回应。IBM 的《数据泄露成本报告》发现,有51%的组织 “计划因数据泄露而增加安全投资...[包括] 事件响应(IR)规划和测试、员工培训以及威胁检测和响应技术等领域。”

Additionally, evidence supports the argument that effective cybersecurity defenses and internal controls dramatically improve containment efforts. Per that same IBM report, "Among organizations that experienced a ransomware attack, those that had automated response playbooks or workflows designed specifically for ransomware attacks were able to contain them in 68 days (or 16% fewer days) compared to organizations without automated response playbooks or workflows."

此外,证据支持这样的论点,即有效的网络安全防御和内部控制可以显著改善遏制工作。根据IBM的同一份报告,“在经历过勒索软件攻击的组织中,与没有自动响应手册或工作流程的组织相比,那些拥有专为勒索软件攻击设计的自动响应手册或工作流程的组织能够在68天(或减少16%的天数)内将其遏制。”

The bottom line

底线

The facts and figures pulled and summarized from the various reports above-and plenty others beside-could be seen by some as a hodgepodge of unrelated data serving no purpose other than to stoke fears about the landscape within which our organizations operate.

从上述各种报告中提取和总结的事实和数据以及除此之外还有许多其他报告可以被一些人视为无关数据的大杂烩而已,除了激起人们对我们组织运作格局的担忧之外没有任何用途。

We would argue, however, that there are discernible trends and commonalities-such as the continued evolution of external threat actors, the vulnerabilities of human elements and the breakdowns of internal controls-that your organization should consider moving forward. And while designing, implementing, monitoring and optimizing your cybersecurity policies and procedures might sound too mundane or too pedestrian to tangibly improve the confidentiality, availability and integrity of your systems and data, many (if not all) of the negative outcomes highlighted in these reports could have been prevented or mitigated with deeper knowledge and appropriate controls.

但是,我们认为,贵组织应该考虑向前迈进,存在明显的趋势和共同点,例如外部威胁行为者的持续演变、人为因素的脆弱性和内部控制的崩溃。尽管设计、实施、监控和优化您的网络安全政策和程序可能听起来过于平凡或过于缓慢,无法切实提高系统和数据的机密性、可用性和完整性,但通过更深入的知识和适当的控制措施,这些报告中强调的许多(如果不是全部)负面结果本可以预防或缓解。

The better you understand your bogeyman - whether the imagined monsters in your closet or the very real threats of the cyber world - the better equipped you are to keep them at bay.

你越了解你的忌人,无论是你壁橱里想象中的怪物还是网络世界的真实威胁,你就越有能力将他们拒之门外。

If you have questions about whether your organization is taking the proper steps to avoid being a statistic in next year's reports, please connect with a Baker Tilly cybersecurity professional. Successfully navigating this landscape is no easy feat. Let's go there, together.

如果您对您的组织是否正在采取适当措施以避免在明年的报告中成为统计数据有疑问,请 与 Baker Tilly 网络安全专业人员联系。成功地在这片风景中航行绝非易事。让我们一起去那里。

View additional multimedia and more ESG storytelling from Baker Tilly on 3blmedia.com.

在 3blmedia.com 上查看 Baker Tilly 讲述的更多多媒体和更多 ESG 故事。

Contact Info:
Spokesperson: Baker Tilly

联系信息:
发言人:贝克·蒂利

SOURCE: Baker Tilly

来源:Baker Tilly


声明:本内容仅用作提供资讯及教育之目的,不构成对任何特定投资或投资策略的推荐或认可。 更多信息
    抢沙发