ARTICLE

Six key cybersecurity trends you need to know about

 

As the world becomes more connected and digital, cybersecurity is becoming more  complicated. As an experienced technology provider, we know how challenging it can be to  prioritize where to focus security efforts. Between infrastructure, data, and apps in the cloud, there’s a lot more to protect. We can help.

72 mins (2)-png-1

Median time it takes an attacker to begin moving laterally within a corporate network once a device is compromised1

 

72 mins

 

of cyberattacks can be protected against with basic security hygiene.2

 

1.2022 Microsoft Digital Defense Report, p. 2.

2.2022 Microsoft Digital Defense Report, p. 108

 

You’re only as strong as your weakest link

Keeping up with today’s threats means securing every area of vulnerability, including email, identity, endpoint, Internet of Things (IoT), cloud and the external attack surface.

Here are six things you need to know to prevent compromise.

#1 Email remains a top vector—and a focus area for defense

In 2022, 35% of ransomware involved the use of email. Phishing attacks increased by 61% from 2021 to 2022. Attackers are commonly using legitimate resources to carry out their campaigns. It’s getting harder to tell the difference between real and malicious emails.

Using safeguards like URL checking and disabling macros will help strengthen your security posture. Tackling more advanced email threats requires that you correlate email signals into broader incidents, visualize the attack, and understand how attackers are taking advantage of other parts of the environment to leverage legitimate resources. We can help you keep your guard up as threat actors increase the quality of social engineering in their attacks, using AI and other tools to be more persuasive.

72 minutes
median time it takes an attacker to access private data if you fall victim to a phishing email3

3. 2022 Microsoft Digital Defense Report, p. 21

#2 The expanded identity landscape also expands opportunities for threat actors

Attackers are getting more creative in circumventing multi-factor authentication (MFA) and phishing kits have made it even easier to steal credentials. The fact is, managing the identity attack surface is more than just securing user accounts. You also need to cover cloud access and workload identities too.

For instance, attackers frequently get access to third-party accounts and then use those credentials to infiltrate the cloud and steal data. Often, this is accomplished through workload identities, which can be overlooked in permissions auditing.

Attacks targeting identity will continue to grow in volume and variety. Let us help you ensure that you have complete visibility into your identity and access.

72 mins (12)-png  921
Password attacks per second in 2022, a 74% increase from 2021

 

72 mins (3)93%
of Microsoft investigations during ransomware recovery engagements revealed insufficient privilege access and lateral movement controls

4. 2022 Microsoft Digital Defense Report, p. 2

5. 2022 Microsoft Digital Defense Report, p. 14

 

#3 Hybrid environments and shadow IT have increased endpoint blind spots

The sheer number of devices in today’s hybrid environments has made securing endpoints more challenging. Unmanaged servers and BYOD personal devices contribute to the shadow IT landscape—and are particularly appealing to threat actors. And it only continues to grow. We are ready to help you improve endpoint visibility and security hygiene.

3,500
Average number of connected devices in an enterprise that are not protected by an endpoint detection and response agent



6.  2022 Microsoft Digital Defense Report, p. 14

4. IoT devices are proliferating, and so are IoT threats

IoT devices are an often overlooked endpoint attack vector. Interestingly, as organizations harden routers and networks to make them more difficult to breach, IoT devices are  becoming a threat target of choice. For instance, an IoT device can exploit vulnerabilities to turn IoT devices into proxies—using an exposed device as a foothold onto the network. Frequently, organizations often have no visibility into IoT devices, and can even contain dangerous vulnerabilities, such as outdated, unsupported software.

There are emerging regulations for IoT security in various countries, but it’s vital to gain more visibility into all your attack surfaces—and that includes IoT devices.

 

41 Billion
IoT devices expected in enterprise and consumer environments by 2025

 

60%
of security practitioners say IoT and operational technology (OT) security is one of the least secured aspects of their infrastructure7

7. "The State of IoT/OT Cybersecurity in the Enterprise” 2021 Ponemon Institute Research Report, p. 2

 

#5 Protecting the cloud is critical, but complex

Organizations are increasingly moving infrastructure, application development, workloads, and data to the cloud. This radical shift has increased the number of new attack vectors for cybercriminals to exploit, with many gaining access through gaps in permissions security. Cloud app development is a top cloud attack vector. So is cloud storage. And sometimes, cloud services providers themselves can be affected.

For app development, we recommend embracing a “Shift-left” security approach—that is, thinking about security at the earliest phases of app development. We can help you integrate your cloud and multi-cloud assets with your security tooling.

895
man-in-the-middle phishing attacks detected per month by Microsoft Defender for Cloud Apps, on average8

 

84%
of organizations that suffered ransomware attacks did not integrate their multi-cloud environments into security operations tooling

 8. 2022 Microsoft Digital Defense Report, p. 95

9. 2022 Microsoft Digital Defense Report, p. 16

#6 Securing the external attack surface is an internet-scale challenge

Today, an organization’s external attack surface spans multiple clouds, complex digital supply chains and massive third-party ecosystems. It also extends beyond its own assets, and includes suppliers, partners, unmanaged personal employee devices, and newly acquired organizations. Fact is, the internet is now part of the network, and despite its almost unfathomable size, security teams must defend their organization’s presence throughout the internet to the same degree as everything behind their firewalls.

Are you aware of your external connections and exposure? Let us help you gain more visibility into your external attack surface and identify vulnerabilities throughout the entirety of your environment and extended ecosystem.

 

1,613
cyberattack–related data compromises in 2021;
more than all data compromises in 202010

53%
of organizations experienced at least one data breach caused by a third party from 2018-2020

10. 2021 Identity Theft Resource Center Annual Data Breach Report, p. 5

Our services and solutions help to keep your business protected

As a Microsoft partner, we’re here to help you take advantage of the Microsoft Security solutions that give your business the security strategies you need to keep up with evolving threats. We have the expertise to assess, pilot, and deploy the right Microsoft security solutions for your business, along with a variety of managed services to help streamline your security operations. 

Bulletproof 365 Enterprise Badge Logo

Transform Your SOC Today

As security experts, we choose Microsoft Sentinel because we've seen firsthand how putting a modern SIEM solution in place transforms the SOC in businesses just like yours. Whether you need an assessment, are ready to deploy, or need customization or managed security services, we're ready to help you optimize threat detection, investigation, and response. 

Learn more about Bulletproof 365 Enterprise (B365E), our intelligent MXDR Security powered by Microsoft 365 and Microsoft Sentinel. Get proactive protection and responsive security with 24/7 security incident triage, investigation and response and advanced threat hunting to secure any gaps.

LEARN MORE

CTA_Defend against threats Engagement

Microsoft Threat Protection Engagement 

Learn how to put next-generation Microsoft security tools to work for you.

With this engagement, you’ll gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to remediate vulnerabilities and upgrade your security posture for the long term.

LEARN MORE

Rapid Test Flight

Microsoft Security Copilot Rapid Test Flight

This two-week engagement is tailored to ensure you receive expert assistance in deploying your Security Copilot effectively and efficiently.

Ready to take flight?

LEARN MORE

Call Us

1.866.328.5538