La majorité des activités liées aux rançongiciels étaient le fait de trois principaux groupes. Beazley Security Labs a également identifié des tendances intéressantes chez les voleurs d'informations, notamment des techniques sophistiquées pour diffuser et masquer le malware, ainsi que de nouveaux entrants pour répondre à la demande.
Unintended data disclosure is usually caused by human error, and it is a persistent risk that can be managed through good data governance and regular employee training.
You rely on vendors to help you operate efficiently, but they can also expose you to data theft, ransomware, or intrusion into your system. You can minimise this risk with the right IT security and risk management procedures.
Misconfiguration of a cloud resource can expose sensitive data or give cybercriminals access to IT and other resources.
Data breaches caused by the intentional actions or negligence of trusted insiders can be hard to prevent, but a combination of risk management, training and technology can help avoid them.
Distributed denial-of-service (DDos) attacks are on the rise again, with cheap tools available to launch them and cybercrminals using DDoS as part of broader attacks.
Cybercriminals steal data because it can be valuable and to back up threats of public exposure and reputational damage. However, your data can be protected from theft with good IT security and risk management.
Because business email compromise (BEC) often relies on social engineering, people are as important as technology in preventing losses from BEC.
Protecting against a ransomware attack requires the right approach to IT security and risk management, including a defence in depth approach to securing your environment.