Ransomware was exposed by hackers who attacked a US oil pipeline. The White House was immediately alerted. Over the next few months, there were many government initiatives to improve security for international organisations. For best practices, cyber risk management was the main focus.
Cybercriminals might have intended to compromise security but they didn't intend to enter Colonial Pipeline. While it is important to understand the importance of risk management, it is another to actually put it into practice.
What should companies do first? It is essential to map and understand the digital attack surface. Trend micro research showed that only 51 percent were able do so. Others identified significant visibility gaps.
What does an attacker's digital attack surface look like?
An attack surface is a collection of all digital assets that could potentially be compromised by local or remote threat actors. This includes:
• Laptops and computers
• IoT endpoints
• Websites and mobile/web apps
• Remote desktop protocol (RDP) endpoints
• Virtual private networks (VPNs),
• Servers
• Cloud services
• Infrastructure and services to support supply chain management
These networks can be attacked using multiple techniques, such as vulnerability exploitation or phishing. Once inside, they can move on to other areas of the attack surface. Trend Micro's 2021 roundup reports reveals just how vulnerable organizations are.
Visibility is difficult
Cybersecurity is founded on the principle that you can protect what you don’t see. This is an important first step in reducing the risk of serious compromise. It's not as simple as it seems. Our survey found that only 62% of respondents have visibility over the entire attack surface. This number could rise even further. Why is this happening? There could be many causes of the problem, including:
Related topics: