Building Resilience In A Changing Cyber Threat Landscape

It’s no secret that cyberattacks are a major threat to organisations in all industries. But despite widespread warnings of malicious activity and the disastrous financial and reputational consequences they can cause, organisations are still less prepared for cyberattacks than they realise.

The goalposts are constantly shifting, with technologies like AI accelerating social engineering attacks and bad actors now exploiting cloud servers to conduct their campaigns. On a seemingly endless treadmill of threats, staying ahead can feel like an uphill battle. 

A Constantly Changing Cyberscape

Today, organisations need to be wary of all kinds of attacks, including phishing, malware, and DDoS, to name just a few. One of the most prevalent threats is ransomware attacks, which can lead to the data of millions of individuals being stolen, not to mention that paid ransoms fund cybercriminals and their future activity. 

A recent IDC report commissioned by Kyndryl found that 70% of IT leaders had been successfully targeted by ransomware within the last year, with two thirds choosing to pay the ransom. 90% of those hit by ransomware said that the attacks exfiltrated company data, likely causing company disruption and financial damages.

A lot of these incidents can be traced back to a single staff member or user clicking on a malicious link. An extreme example of the consequences of human error is the data breach of the Police Service of Northern Ireland (PSNI) last year, which shared the personal details of all PSNI staff, resulting in a fine of £750,000.

The pervasiveness of ransomware attacks signals a need for digital forensics teams to be more powerful and efficient in their response. But siloed, disjointed incident response and incident recovery processes often cause further problems and hinder businesses’ ability to get back up and running after an incident, with the two teams often unintentionally working at cross-purposes. 

New Avenues For Attack

Now, cybercriminals have a new tool at their disposal: generative AI. Generative AI can produce audio and video clips impersonating real customers and executives, making it easier to fool security systems and conduct phishing or social engineering attacks. Additionally, criminal groups are using generative AI technologies to spread malware and constantly change its code, meaning it can evade IT security systems easier.

With AI likely to increase the volume and impact of cyberattacks over the next few years, businesses need to start fighting fire with fire. Without harnessing AI and machine learning for themselves to spot patterns and flag anomalies, organisations will simply be unable to adapt their cyber defences to meet this rise in threats. 

When starting to implement AI-driven defences, CIOs need to begin by validating essential control implementation, before stress testing their response and recovery capabilities, and adapting training and awareness programmes to reflect AI-based cyberthreats.

Building Cyber Resilience

Human error and AI are key challenges concerning CISOs, and businesses need to go beyond just predicting when the next attack will hit. To anticipate, protect against, withstand, and recover from diverse cyberattacks, the focus should be on building cyber resilience. But cyber resilience isn’t just investing in the right technologies, it also involves a shift in mindset, where an organisation comes together to see cybersecurity in a more holistic way.

The first step in establishing cyber resilience is identifying the critical services the business is dependent on and importantly with what impact tolerances for data loss and outage. Then, they should map their infrastructure to applications and assess whether the controls already in place can protect against a disruptive attack, detect any future threats, and recover if incidents escalate. Lastly, businesses should outline a customised roadmap for continually improving resilience and modernising infrastructure to continue building resilience, recoverability of their critical service should become an important functional requirement. Once companies have followed these steps, they can consider areas where third-party help or technical expertise might be needed, particularly in sector-specific applications. With a continual focus on cybersecurity and potential attacks, businesses can build a culture of healthy scepticism, reducing the likelihood of a successful attack or human error incident, like that of the PSNI. 

Cyberthreats have always evolved to utilise the latest technological advancements. But generative AI’s unprecedented ability to streamline and speed up malicious activity has facilitated the need for more robust and holistic defences.

For businesses to adapt, they need to arm themselves with AI-enabled defences that are stronger than AI-enabled threats, all while adopting a cyber resilience approach that combines cybersecurity, business continuity, and disaster recovery to minimise disruptive, expensive cyberattacks. 

Duncan Bradley is Practice Leader for Security and Resiliency, Kyndryl UK&I

Image: @Kyndryl

You Might Also Read: 

Ransomware: Businesses Are Well Equipped But Underprepared:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Millions Of US Voters Exposed Online
A Brief History Of Cyber Crime [extract] »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.