Greater Incident Complexity, Shift in How Threat Actors Use Stolen Data, Will Drive the Cyber Threat Landscape in 2023, Says Beazley ReportGreater Incident Complexity, Shift in How Threat Actors Use Stolen Data, Will Drive the Cyber Threat Landscape in 2023, Says Beazley Report
Noting 13% year-over-year growth in fraudulent instruction as a cause of loss, report predicts organizations must get smarter about educating employees to spot fraudulent tactics.
February 1, 2023
London, February 1, 2023 — From tactics to implications, cybersecurity will see a subtle but important evolution in 2023 according to Beazley’s new Cyber Services Snapshot report, which was released today. The report reveals that the cyber threat landscape will be influenced by greater incident complexity, the way threat actors use stolen data, and a rise in US class actions in 2023.
The report presents global data on incidents handled by Beazley Cyber Services including cause of loss by industry, ransomware vectors, business email compromise, and data exfiltration. These data points provide a real-time view into incidents reported to Beazley, revealing an ongoing picture of emerging cyber risk. In addition, all Beazley Cyber Services Snapshots feature insights from professionals on the front line of Beazley’s incident response teams around the world.
As a category, fraudulent instruction experienced big growth as a cause of loss in 2022, up 13% year-over-year. This trend continues to be quite high, especially when it comes to small organizations.
To combat this vulnerability, the report suggests, organizations must get smarter about educating employees to spot fraudulent instruction tactics like spoofed emails or domain names. Organizations are cautioned to watch for social engineering and spear phishing, bypassing of Multi-Factor Authentication, targeting of Managed Service Providers, and compromising of cloud environments as areas of vulnerability.
“At first glance, things hardly seem particularly new as we enter 2023: threat actors are still using the same kinds of ransomware vectors to attack, and we’re still talking about the same need for education and controls,”said Russ Cohen, Beazley’s Head of US Cyber Services.“But look beneath the surface, and it quickly becomes evident that targeted organizations are facing greater incident complexity than ever before. As threat actors bring new sophistication to their techniques and adapt to improved cybersecurity efforts, more and more companies will realize they can no longer count on the default configuration of off-the-shelf IT solutions and tools.”
Beazley provides best-in-class support, services, and tools to help insureds mitigate risk and recover quickly in the event of a breach.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware