Building Resilience In A Changing Cyber Threat Landscape

It’s no secret that cyberattacks are a major threat to organisations in all industries. But despite widespread warnings of malicious activity and the disastrous financial and reputational consequences they can cause, organisations are still less prepared for cyberattacks than they realise.

The goalposts are constantly shifting, with technologies like AI accelerating social engineering attacks and bad actors now exploiting cloud servers to conduct their campaigns. On a seemingly endless treadmill of threats, staying ahead can feel like an uphill battle. 

A Constantly Changing Cyberscape

Today, organisations need to be wary of all kinds of attacks, including phishing, malware, and DDoS, to name just a few. One of the most prevalent threats is ransomware attacks, which can lead to the data of millions of individuals being stolen, not to mention that paid ransoms fund cybercriminals and their future activity. 

A recent IDC report commissioned by Kyndryl found that 70% of IT leaders had been successfully targeted by ransomware within the last year, with two thirds choosing to pay the ransom. 90% of those hit by ransomware said that the attacks exfiltrated company data, likely causing company disruption and financial damages.

A lot of these incidents can be traced back to a single staff member or user clicking on a malicious link. An extreme example of the consequences of human error is the data breach of the Police Service of Northern Ireland (PSNI) last year, which shared the personal details of all PSNI staff, resulting in a fine of £750,000.

The pervasiveness of ransomware attacks signals a need for digital forensics teams to be more powerful and efficient in their response. But siloed, disjointed incident response and incident recovery processes often cause further problems and hinder businesses’ ability to get back up and running after an incident, with the two teams often unintentionally working at cross-purposes. 

New Avenues For Attack

Now, cybercriminals have a new tool at their disposal: generative AI. Generative AI can produce audio and video clips impersonating real customers and executives, making it easier to fool security systems and conduct phishing or social engineering attacks. Additionally, criminal groups are using generative AI technologies to spread malware and constantly change its code, meaning it can evade IT security systems easier.

With AI likely to increase the volume and impact of cyberattacks over the next few years, businesses need to start fighting fire with fire. Without harnessing AI and machine learning for themselves to spot patterns and flag anomalies, organisations will simply be unable to adapt their cyber defences to meet this rise in threats. 

When starting to implement AI-driven defences, CIOs need to begin by validating essential control implementation, before stress testing their response and recovery capabilities, and adapting training and awareness programmes to reflect AI-based cyberthreats.

Building Cyber Resilience

Human error and AI are key challenges concerning CISOs, and businesses need to go beyond just predicting when the next attack will hit. To anticipate, protect against, withstand, and recover from diverse cyberattacks, the focus should be on building cyber resilience. But cyber resilience isn’t just investing in the right technologies, it also involves a shift in mindset, where an organisation comes together to see cybersecurity in a more holistic way.

The first step in establishing cyber resilience is identifying the critical services the business is dependent on and importantly with what impact tolerances for data loss and outage. Then, they should map their infrastructure to applications and assess whether the controls already in place can protect against a disruptive attack, detect any future threats, and recover if incidents escalate. Lastly, businesses should outline a customised roadmap for continually improving resilience and modernising infrastructure to continue building resilience, recoverability of their critical service should become an important functional requirement. Once companies have followed these steps, they can consider areas where third-party help or technical expertise might be needed, particularly in sector-specific applications. With a continual focus on cybersecurity and potential attacks, businesses can build a culture of healthy scepticism, reducing the likelihood of a successful attack or human error incident, like that of the PSNI. 

Cyberthreats have always evolved to utilise the latest technological advancements. But generative AI’s unprecedented ability to streamline and speed up malicious activity has facilitated the need for more robust and holistic defences.

For businesses to adapt, they need to arm themselves with AI-enabled defences that are stronger than AI-enabled threats, all while adopting a cyber resilience approach that combines cybersecurity, business continuity, and disaster recovery to minimise disruptive, expensive cyberattacks. 

Duncan Bradley is Practice Leader for Security and Resiliency, Kyndryl UK&I

Image: @Kyndryl

You Might Also Read: 

Ransomware: Businesses Are Well Equipped But Underprepared:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Millions Of US Voters Exposed Online
A Brief History Of Cyber Crime [extract] »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

ClearSale (CLSA3)

ClearSale (CLSA3)

Clearsale’s innovative fraud solutions combine advanced technology with a passionate team of seasoned experts that understand every client’s unique needs.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.