CrowdStrike’s CTO EMEA, Zeki Turedi, discusses the cybersecurity landscape in the coming months and why partner choices, not technology, will determine the future course of action.
It’s safe to say that the past year has been relentless on the front lines of cybersecurity, with attackers becoming more sophisticated and employing more sophisticated techniques and technologies to evade organizational security measures.
Ransomware will remain the most dangerous, costly and prevalent cyberthreat for EMEA organizations in 2022 and the most damaging cybercriminal tool in 2023. According to CrowdStrike 2022 Global Threat ReportRansomware-related data breaches are up a staggering 82% year-to-date, costing companies involved an average of €1.72 million in losses, according to.
It’s easy to understand that ransomware is an enduring attraction for cybercriminals. Over the past two years, obtaining and using ransomware tools has never been easier. An ecosystem of criminal suppliers offering ransomware-as-a-service, along with other elements of operations ranging from stolen credentials to payment services and money. An increasing number of providers are laundered and offered as third-party services. A current and valid credit card is all you need to get started as a cybercriminal. This alignment of criminal service providers to offer specialization and automation could only grow this year, sadly. It will continue to grow until it adopts advanced tools that make it higher.
Unfortunately, European organizations are likely to suffer from cybercrime in 2023, just like the rest of the world. While some countries have a good understanding of the risks and available defenses, Europe has a more fragmented picture and a lower level of cybersecurity understanding. Common in some parts of the region. Most notably, some organizations are still skeptical of cloud technology, or their hands are tied when choosing the right technology due to misunderstandings and confusion about local or regional regulations and privacy requirements. I feel that I am
These attitudes change over time. In fact, there is no privacy without security. Stolen or leaked data is no longer private, regardless of applicable laws and regulations. Likewise, solving the latest threats requires the latest technology. The task of keeping data of all kinds safe can only be matched by next-generation cloud-based cybersecurity solutions that harness the world’s big data.
Many countries around the world expect their economies to approach recession this year. Cost cutting is a hot topic in many companies, and cybersecurity budgets have increased on average over the years, but they will certainly come under scrutiny. It may be, but maintaining the highest level of security is non-negotiable for any company.
Nevertheless, many companies have more tools than they need. After our own discussions with his CISO, it is not uncommon for companies to have multiple licensed cybersecurity products at their disposal. This does not give immunity to attack. In fact, many organizations suffer from poor security levels and team performance due to redundant or excessive notifications and checks. Working towards a single, unified point of trust through a unified platform not only reduces costs, but also increases cybersecurity analyst productivity and performance.
2022 saw several evolutions in attackers’ ransomware tactics. There has been a significant increase in extortion attempts based on the extraction of sensitive data and the threat of selling or exposing this stolen information. In fact, during the last year, we have seen many cases where traditional encryption of victim data was not part of the attack and the attackers were working directly to threaten the disclosure of the data. The reputational damage that such leaks entail. Extortion tactics can be worth millions of euros per attack and can be repeated without additional effort on the part of the attackers as long as the data retains value to its rightful owners.
As in previous years, the most sophisticated and successful attackers no longer use malware-based attacks and are focusing on non-malware-based techniques. As companies continue to focus on malware, these interactive attacks are beginning to increase the success rate of cyber attackers. They now account for 71% of successful breaches, up 50% from the previous year. Cybercriminals, once pragmatists, are now focused on identity-based attacks. This allows access to dark web underground markets or other techniques rather than hacking into the victim’s system.
The continued shift to malware-free attacks has increased strongly since 2019, making identity protection central to cybersecurity in 2023. In addition to established and well-understood policies for strong passwords, organizations should adopt new technologies specifically developed to make it more difficult for criminals. for successful identity-based attacks. Your security department should establish a Zero Trust policy and the technology to support it (if you haven’t already). All identities on the network should be investigated and various techniques used to verify whether the identity is legitimate. Their technology partner of choice should provide some way in which this legitimacy can (or cannot) be established. You should partition the data in your organization according to the needs of different roles in your organization. For example, sales representatives may legitimately need access to customer records. Those who work in production probably don’t.
Alongside identity, APIs will be part of the cybersecurity battlefield in 2022. This trend is expected to continue this year and beyond. Gartner predicts that this will become the most popular attack vector over time. Many cloud and SaaS services are accessed and controlled through APIs that extend their functionality and allow data to flow through various applications. This is the key to the power and popularity of the cloud and SaaS, but like any other rapidly growing technology, it has attracted the attention of bad actors. There have been many successful attacks in this domain, and security-conscious organizations are already adopting solutions that can capture and assimilate signals from different parts and endpoints of their IT assets.
Technology is advancing very quickly and this year will be no different. Anyone who has worked in this field knows that. Tools and processes that were best practices in 2022 could be considered dangerously obsolete by the end of the year. This has important implications for vendor selection. It doesn’t make much sense to focus entirely on a particular product or technology. This is because they are inherently short-lived. Rather, you should choose a vendor who will adapt and support you as technology and threats evolve, and who will partner with you through the uncertain times ahead. Partner organizations have evidence of a high level of sustained support for their customers. We are transparent about our current features and roadmap.
We hope that your choice of partner will lead to a happy and safe 2023.
Click below to share this article