Improve Cyber Security Posture with 2023 Predictions
If a stronger cyber security posture is one of your organization’s new year’s resolutions, focus on what matters with these five essential highlights from the Trend Micro Security Predictions for 2023.
Digitalization has made enterprise cybersecurity more complex than ever before. Taking that context into account, Future/Tense: Trend Micro Security Predictions for 2023 looks at some of the key trends organizations will need to address to strengthen their security posture for the year ahead.
This article by Jon Clay, Vice President, Threat Intelligence, Trend Micro, focuses on four priority threat predictions—cloud misconfigurations, hidden vulnerabilities, the vanishing network perimeter, and evolving ransomware business models—as well as a growing trend that will redefine enterprise cybersecurity going forward: the shift from point security solutions to a unified platform approach.
2023 prediction: Cloud misconfigurations will continue to undermine cybersecurity
What’s the risk with cloud misconfigurations?
Misconfiguration has been the most significant cloud risk for a couple of years now, accounting for up to 70% of all cloud security challenges. That shows no sign of changing in 2023 given the ongoing pace of cloud migrations, especially as network environments become more distributed and the hybrid workforce grows—opening the door to attacks and the misuse of cloud resources.
How to strengthen your cyber security posture
Misconfigurations occur because enterprise clouds are complex multi-vendor environments and IT teams seldom have time to get familiar with all the technologies. Creating upfront space for learning and testing can have big payoffs down the road.
For example, different cloud providers may have different restoration procedures for data backups. Giving IT the chance to test those procedures and internalize them means they’ll be prepared to act when company data has to be recovered in the wake of an incident.
Because of cloud complexity, automation is crucial. It’s not practical for teams to manually check the entire environment for correct configurations. Platform-based cloud-native software that can scan and verify settings without human intervention has the double benefit of relieving burden and catching errors in real time so they can be addressed.
2023 prediction: Attackers will continue to exploit overlooked vulnerabilities
What’s the risk with overlooked vulnerabilities?
Outdated network protocols, hardware, and firmware can all be sources of hidden vulnerabilities that create potential attack vectors for bad actors. At the same time, new applications that use open-source software are also prime targets—and will be throughout 2023. Now that most cloud-native projects depend in some way on open-source software that is subject to fewer vulnerability checks during development, malware and other weaknesses can easily end up embedded in cloud-based enterprise operations.
How to strengthen your cyber security posture
Technology companies—and legislators in some jurisdictions—are paying closer attention to the risks associated with open-source software. Up-to-date global threat intelligence is now considered vital. So are bug bounty programs designed to catch and patch flaws before they can be exploited, such as the one Google launched last year and the vendor-agnostic Trend Micro™ Zero Day Initiative™.
Enterprises can protect themselves with diligent software patching, virtual patching, open-source software security policies, and automated monitoring to defend against attacks. When it comes to supply chains, they will also want to adopt software bills of material (SBOMs) for their applications, which make it easy to pinpoint affected software versions and systems when security flaws are identified.
2023 prediction: The perimeter will continue to expand
What’s the risk of an expanding perimeter?
Hybrid and remote work are hallmarks of the expanding network perimeter. Last year, IBM and the Ponemon Institute determined that the more remote workers a business has, the more a data breach will cost: a company with an 81% remote workforce will pay roughly US$2.39 million more for a breach than a company with 50% remote workers.
Cybercriminals will continue to attack hybrid work structures in 2023, launching network-based worms and exploiting virtual private network (VPN) connections, which are still popular despite hundreds of known vulnerabilities. Business email compromise (BEC) attacks will also persist—on track to cause losses of US$2.8 billion by 2027.
How to strengthen your cyber security posture
A zero trust approach is the best way to protect data and assets in the context of an expanding—and evaporating—network perimeter, with a Secure Access Service Edge (SASE) architecture to consolidate security and network functions in distributed, cloud-oriented environments. Zero trust network access also solves the VPN problem by securely connecting authorized users only to specific applications or services, not the whole network.
On the BEC front, two-factor verification, stronger password hygiene combined with zero trust authentication can help lessen the threat of email scams.
2023 prediction: Ransomware business models will continue to evolve
What’s the risk of new ransomware business models?
Ransomware perpetrators will seek new ways of profiteering in 2023, from directly monetizing information like stolen critical data to setting their sights on the cloud. Up to now, ransomware has tended to be designed for on-premises environments, but with all the enterprise investment in cloud, it’s a logical new target—one whose defenses remain untested. Since no business is immune to the threat of ransomware, every enterprise, however large or small, needs a proactive approach to defending against these attacks.
How to strengthen your cyber security posture
Here again, the zero trust approach is a must, paired with regular backups, cultivating an organization-wide cybersecurity culture, and taking advantage of existing frameworks from organizations like the Center of Internet Security (CIS) and the National Institute of Standards and Technology (NIST). Also, look to shift left in detecting an attack earlier in the lifecycle that can help mitigate a later ransomware attack.
Another way to guard against ransomware, is to adopt a unified cybersecurity platform which can help security teams gain visibility of an attack across the network stack.
2023 prediction: Enterprises will shift from point solutions to a platform approach
What’s the risk of point solutions?
Organizations deploy an average of 46 individual security monitoring tools, overwhelming security teams with uncorrelated daily alerts and too many false positives, resulting in the very real risk of a genuine attack slipping through the cracks. The traditional security paradigm using a point model is not sustainable: the scope and complexity of today’s cyber threats demand a holistic approach to security, delivered by a unified cybersecurity platform.
How to strengthen your cyber security posture
The move toward a platform approach will be led by organizations actively seeking more visibility across their attack surfaces like distributed clouds, networks, assets, accounts, and systems. To be truly effective, a platform will need to combine security information and event management (SIEM) with extended detection and response (XDR), artificial intelligence and analytics to provide an integrated view of the entire IT/cloud environment and deeper, contextualized correlations of alerts.
Platforms can also support endpoint detection, network defense monitoring, and more—with automation for continuous, repetitive discovery, assessment, and mitigation. They even help defend against zero-day exploits by checking bug bounty programs.
Even more predictions for 2023
Cloud misconfigurations, overlooked vulnerabilities, the vanishing network perimeter and evolving ransomware business models are just some of the forecasted trends in Trend Micro Security Predictions for 2023. While each has unique causes and impacts, the scale and complexity of all will necessitate the enterprise shift toward unified cybersecurity platforms. Companies that get an early start at consolidating their security point solutions will be well positioned to address the threats of the coming year—and beyond.
Comentários