Dealing With Security Incidents In The Enterprise Sector 

Cyberattacks are an ongoing challenge for organisations of all sizes across the world with ransomware a particular growing threat.  According to a recent research, ransomware payments totalling almost $450 million were paid in the first six months of 2023, against a complete year total of $500 million in 2022.

Regular stories emerge about high-profile companies impacted. Earlier this year, Royal Mail suffered a ransomware attack when the LockBit group hacked its software, whilst Barts Health NHS Trust was targeted in the summer. 

Ransomware, phishing, or another malware attack, and user account compromise are the most common attack vectors, according to recent Netwrix research which shows that 68 percent of respondents experienced at least one security incident within the last 12 months.

However, the research reveals that the threat landscape for the enterprise sector (organisations with over 1,000 employees) differs from that faced by their smaller counterparts. In particular, large organisations experience greater financial impact from security incidents and suffer more malware attacks. Enterprise IT and security leaders should keep this in mind when conducting risk assessments, forecasting the business impact of attacks, and prioritising their mitigation strategies.

Security Incidents In The Enterprise Sector 

According to the findings for the enterprise sector, 65 percent of enterprises suffered at least one cyberattack within the last 12 months. These attacks targeted enterprises’ on-premises environments more than the cloud. For example, 84 percent experienced phishing on premises and only 64 percent spotted it in the cloud. 

What’s more, the enterprise sector spotted more security incidents than organisations overall. The starkest difference was for ransomware and other malware attacks: 48 percent of enterprises experienced this type of security incident on premises compared to 37 percent among organisations of all sizes. 

This statistic is not surprising. Ransomware operators want to maximise their profits, so they consider which organisations are most likely to pay a ransom to reduce business downtime — and the larger an organisation is, the costlier an operational disruption will be. 

Mitigating The Risk Of Ransomware & Other Malware Attacks 

Addressing the threat of being attacked with ransomware starts with informing internal staff about the issue and providing up-to-date cybersecurity training. Ensuring that all staff understand and follow basic cyber hygiene practices helps prevent malware infections by reducing the risk of users falling victim to phishing campaigns. 

The second step is reducing the organisation’s attack surface by taking control over access rights. One key reason that on-prem environments are more vulnerable to malware attacks than SaaS systems is on-premises privilege sprawl — users often have administrative rights on their computers, there are large numbers of highly privileged accounts, and so on. These excessive rights enable ransomware to spread quickly from an initial compromised endpoint across the entire IT ecosystem. 

With this in mind, enterprises should strictly limit each user’s privileges. For business users, this means enforcing the least privilege principle with comprehensive identity access management (IAM).

For effective implementation, look for solutions that provide automated approval workflows that empower users to request the access rights they need and enable business owners to approve or deny those requests, as well as to regularly review and validate access rights to the data and applications they are responsible for.

The best way to rein in privileged access is to implement effective privileged access management (PAM), ideally through a zero-standing privilege (ZSP) approach. ZSP involves eliminating as many risky standing privileged accounts as possible. Instead, users are granted elevated privileges only when they are required, for only as long as required. 

Third, be prepared for attacks that might get through your defenses with a thorough incident response plan (IRP) that is regularly reviewed and tested. An ideal IRP should include automated controls that can instantly disable compromised user access to sensitive data and terminate suspicious behaviour. This approach can stop an unfolding attack before the organisation suffers a costly data breach.

Cyber Insurance For The Enterprise Sector 

28 percent of enterprises estimate the financial damage from cyberattacks to be $50,000 or more. This is in stark comparison to only 16 percent of organisations overall. To mitigate this financial risk, 58 percent of enterprises already have a cyber insurance policy or plan to purchase one within the next 12 months. 

The process of qualifying for cyber insurance can be quite tricky. The research reveals that 50 percent of organisations with cyber insurance implemented additional security measures either to meet the requirements of the policy they selected or to simply be eligible for a policy at all. An insurance company’s audit of an enterprise’s security posture can provide the IT team with valuable insights that will help them eliminate security gaps. 

An insurance payout can defray the financial impact or even prevent bankruptcy of the organisation — but no policy can restore data or operations.

Enterprises realise this; data security was named the top IT priority for 2023, chosen by 68 percent of respondents.

Dirk Schrader is VP of security research at Netwrix                             Image; Geralt

You Might Aso Read: 

PAM, IAM, Or Both?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The Slots Fall Silent
The US Space Force Needs Help »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

Norsk Akkreditering

Norsk Akkreditering

Norsk Akkreditering is the national accreditation body for Norway. The directory of members provides details of organisations offering certification services for ISO 27001.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.