
Most tech companies, from big to small, pretty much run the same basic infrastructure, email, and messaging within their organization. Which, of course, then becomes the fuel for a second ransom demand." Key takeaway #2: Collaborative platforms are at heightened risk for security breaches due to WFH For example, don't underestimate for a second how valuable targeting data and how much targeting data that the ransomware actors obtain when they hack into one of their victims and steal all their internal data. "Let's not forget, each breach tends to beget more breaches. That generally doesn't happen as much anymore with the bad guys using compromised infrastructure, or does probably in part because so much of the "bad stuff" has migrated to the cloud.īy and large, attackers are also getting way better at not spamming people who aren't able to be victims of their spam so basically, not drawing undue attention to their crime infrastructure, which is making their attacks more organized. In the case where the bad guys are using compromised infrastructure, the malicious host isn't complicit attacked, right? So, cleaning up the infection, more often than not, in the old days meant getting the victim to first care and then take appropriate action. The average vendor compromise attack is costing organizations over $180,000, and hackers are successful with those compromises about 12% of the time. While cyberattacks have shifted over the last decade, email is still the primary attack vendor even in 2022. Key takeaway #1: Cyberattacks relying on email still prevalent Here are some of the key highlights from their riveting discussion on preventing cyberattacks that matter the most. Have you ever attended a webcast and were saddened when it's over because the presenters really made you think? That was the case for a broadcast SecureWorld recently hosted with Mike Britton, CISO of Abnormal Security, and legendary investigative journalist Brian Krebs.
