Tuesday, December 17, 2024
Homecyber securityIT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

Published on

SIEM as a Service

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed light on the growing concerns within the cybersecurity community.

The survey, which gathered insights from over 800 IT and security executives globally, reveals a stark reality: 92% of respondents have observed a surge in cyber-attacks compared to the previous year.

The complexity and frequency of these attacks are putting unprecedented pressure on organizations, with a significant 73% having suffered monetary losses due to cyber incidents.

- Advertisement - SIEM as a Service

Vulnerable Sectors Under Siege

Cybercriminals are not indiscriminate in their targets. The survey identifies IT services, financial operations, and supply chain management as the most frequently attacked sectors within organizations.

The hospitality/travel, manufacturing, and financial services industries are also facing weekly and monthly attacks, with ransomware and phishing topping the list of concerns.

Industries at Risk

The New Wave of Sophisticated Attacks

The findings from Keeper Security’s survey highlight the urgent need for organizations to adapt their cybersecurity strategies to counter both existing and emerging threats.

A staggering 95% of IT leaders acknowledge that cyber-attacks are increasing in frequency and sophistication.

The most serious emerging threats include AI-powered attacks, deepfake technology, supply chain attacks, cloud jacking, IoT attacks, 5G network exploits, and fileless attacks.

AI-powered attacks are particularly concerning, as they enable cybercriminals to automate and scale traditional attack techniques like phishing and password cracking.

This has led to a call for a proactive cybersecurity approach that combines advanced defense mechanisms with fundamental best practices.

To combat these threats, IT leaders are planning to increase their AI security measures through data encryption (51%), employee training and awareness (45%), and advanced threat detection systems.

In North America, the focus is equally split between threat detection systems and data encryption, each at 50%.AI Security Measures

Phishing remains a significant challenge, with 67% of companies struggling to combat these attacks.

The rise of AI tools has made phishing scams more believable and harder to detect, with 84% of respondents finding them more difficult to identify.

Insider Threats and the Importance of PAM

Not all threats come from the outside; 40% of respondents have faced attacks from within their organization.

Privileged Access Management (PAM) solutions are crucial for managing and securing privileged credentials and enforcing the principle of least privilege to minimize damage from potential insider threats.

Despite the evolving threat landscape, fundamental cybersecurity practices remain crucial. Organizations are encouraged to adopt password and PAM solutions to prevent prevalent attacks.

A password manager can enforce strong password practices, while PAM solutions control and monitor high-level access.

These measures create a layered security approach that enhances overall cybersecurity resilience.

As cybercriminals continue to refine their tactics, IT and security leaders must remain vigilant and proactive in their defense measures to protect their organizations’ digital landscapes.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

Kali Linux 2024.4 Released – What’s New!

Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed...

CISA Warns of Adobe & Windows Kernel Driver Vulnerabilities Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two...

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Kali Linux 2024.4 Released – What’s New!

Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed...

CISA Warns of Adobe & Windows Kernel Driver Vulnerabilities Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...