New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Amplified security trends to watch out for in 2023

New York Tech Editorial Team by New York Tech Editorial Team
December 22, 2022
in Cybersecurity
0
Amplified security trends to watch out for in 2023
Share on FacebookShare on Twitter

In 2023 and beyond, organizations can expect to continue dealing with many of the same threats they face today but with one key difference: expect criminals to leverage technological advancements to optimize the effectiveness of their attacks. You should also expect the adoption of new technologies to support new working practices (remote/hybrid) to play a big part.

security trends 2023

Here are a few examples of some of these amplified threats and how you can mitigate them.

Social engineering attacks at scale

We can still (fairly) easily tell when we are interacting with a bot today, but it’s only a matter of time before bots become sophisticated enough to make it difficult for the average person to spot them. This is particularly problematic if they are used to engage and manipulate unsuspecting victims in your organization at scale.

Email spam filters are not enough to defend against this type of attack. One of the most effective ways to respond to this threat is via end-user education and security awareness: simply making sure that people realize that this type of attack exists, the methods used to gain access to credentials and other sensitive content, and how to stay alert and check that they are dealing with a trusted contact and not a criminal or bot. A short, simple infographic on your intranet describing “5 telltale signs of a social engineering attack” can pay dividends.

Monitoring user behavior with behavior analytics tools to detect any anomalous patterns or compromised credentials can offer an additional layer of protection. Are certain employees emailing an unusually large number of files to the same external party? Or are some employees logging into the network from unrecognized IP addresses?

Insider recruitment

Cybercriminals target employees across different industries to surreptitiously recruit them as insiders, offering them financial enticements to hand over company credentials and access to systems where sensitive information is stored. This approach isn’t new, but it is gaining popularity. A decentralized work environment makes it easier for criminals to target employees through private social channels, as the employee does not feel that they are being watched as closely as they would in a busy office setting.

Aside from monitoring user behavior and threat patterns, it’s important to be aware of and be sensitive about the conditions that could make employees vulnerable to this kind of outreach – for example, the announcement of a massive corporate restructuring or a round of layoffs.

Not every employee affected by a restructuring suddenly becomes a bad guy, but security leaders should work with Human Resources or People Operations and people managers to make them aware of this type of criminal scheme, so that they can take the necessary steps to offer support to employees who could be affected by such organizational or personal matters. This level of employee care and appreciation can make them less vulnerable to this type of cyber recruitment.

Additionally, it’s worth making sure that escalation procedures are well-known and easy to follow. If an employee is approached – by a cybercriminal or someone they know – about sharing their credentials to gain unauthorized access to the company network, what should they do? Contact their manager? The IT department? Whatever the official escalation process is in your organization, make sure it’s clear and well understood: make it easy for employees to do the right thing.

Security gaps in misconfigured cloud applications

As more and more organizations continue to move their systems and applications to the cloud, criminals know that this increases their chances of coming across more systems left exposed due to misconfiguration.

An ounce of prevention is worth a pound of cure. Some of these applications may serve the needs of a specific department or team. Therefore, the focus is more on the business issues the applications may be trying to resolve than the need to integrate and interact with internal systems and endpoints securely. It should be mandated that for any new cloud applications being onboarded or deployed by any department, the security team needs to be brought in early – not after the system has already been selected. The security team can ensure that the application is tested as part of the selection process and meets the requirements of the configuration checklist based on internal security policies.

Another area to pay close attention to is the shared responsibility model. Cloud vendors may promise that their services sit within a secure architecture and have put stringent security measures in place. But this does not guarantee full protection for your data, applications and other assets. Make sure that all parties (users, IT operations, cloud provider) are clear about their roles and responsibilities and the configuration of the cloud application meets the standards set by the company.

Finally, consider putting in place regular risk assessments and audits to validate current permissions across all cloud systems. This will help to reduce the impact from compromised credentials and other potential vulnerabilities.

Small steps can help tamp down new threats

These are just some examples of the threats security teams can expect to spend their time thwarting in 2023. Unfortunately, it’s a matter of “when” and not “if” your organization will be targeted by cybercriminals. Organizations and security teams need to be prepared to minimize cyber risk. In many cases, it takes just a few small steps to make a world of difference in your overall security posture and ability to keep sensitive data safe and out of the hands of cybercriminals.

Credit: Source link

Previous Post

Twitter view counts start appearing prominently

Next Post

Walnut Appoints Former Spotify Director as VP of R&D

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Walnut Appoints Former Spotify Director as VP of R&D

Walnut Appoints Former Spotify Director as VP of R&D

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025
Magnus Almqvist, new CEO of Exberry

Exberry Appoints Magnus Almqvist as CEO to Drive Next Phase of Strategic Growth

March 5, 2025
Expert Family Law Firms in New York: Your Essential Guide to Legal Help

Expert Family Law Firms in New York: Your Essential Guide to Legal Help

March 3, 2025

Recommended

Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media