Skip to main content

It’s time to catch up with cyber attackers

Web Hosting & Remote IT Support

The cyber threat landscape has reached a critical tipping point.

According to the UK government's 2024 Cyber Security Breaches Survey, a staggering 50% of businesses experienced some form of cyber breach in the last 12 months, with this figure rising dramatically to 70% for medium businesses and 74% for large businesses.

Phishing attacks dominate the threat landscape, accounting for 84% of business breaches, followed by email impersonation (35%) and malware (17%).

The statistics, while alarming, reveal only part of the challenge facing organizations today. The most pressing issue isn't just the increasing frequency of attacks, but also the growing disparity between how quickly attackers can breach systems and how long organizations take to respond.

Contemporary security technologies can detect threats within minutes, yet the average time for organizations to fully identify, contain and restore systems stretches to about 20 days – with recovery times far longer. This extended vulnerability window gives cybercriminals ample time to infiltrate networks, compromise sensitive data and even establish a backdoor for future attacks.

Recent headlines have highlighted the devastating impact of delayed response times across various sectors. From the UK Air Traffic Control's miscommunicated cyber incident last year to UnitedHealth's delayed response to a massive data leak in April this year, as well as ongoing challenges faced by British Ambulance Services and Nuclear plant Sellafield, the impact of inadequate response times continues to be felt.

These incidents underscore a troubling reality. When organizations cannot respond swiftly to cyber threats, the consequences ripple far beyond immediate operational disruption. The financial toll is substantial – IBM reports a 10% increase on the cost of an average data breach in 2024, rising to $4.8million.

The evolution of cybersecurity tools

That said, the cybersecurity industry has made remarkable strides in developing defensive technologies, yet many organizations struggle to maximize their potential.

Modern Extended Detection and Response (XDR) platforms represent a significant advancement, offering sophisticated threat detection and automated response capabilities that can identify and neutralize threats across an organization's entire IT infrastructure.

The latest generation of security tools also incorporates predictive capabilities, leveraging vast databases of threat intelligence to anticipate and prevent attacks before they materialize. These systems can link seemingly unrelated events across different parts of the network – in doing so, subtle patterns that might indicate an emerging threat can be identified – a key part in taking detection timelines from days to hours.

This evolution from reactive to proactive defense represents a crucial step forward in closing the response time gap. However, the form of data remains crucial. Too often, we see organizations dealing with theoretical data as opposed to actual, real-time information. Relying on the former may prove effective in theory, in practice, it’s a different story altogether. No one organization's defense is the same.

Building a cyber safe culture

Indeed, creating an effective cyber defense requires more than deploying the latest security tools – it demands a fundamental shift in organizational culture.

Security posture assessments need to become an ongoing process rather than a periodic checkbox exercise. By continuously evaluating and adjusting defenses, organizations can identify and address vulnerabilities before attackers have the chance to exploit them. The integration of artificial intelligence and machine learning capabilities has become key to this effort, not least because it has reduced time needed to spot and investigate potential threats but also the ability to bring contextual data into play, allowing a more informed response.

Best practices for rapid response

Indeed, a robust cybersecurity strategy must seamlessly integrate people, processes and technology.

Security teams require immediate access to clear and actionable threat intelligence through intuitive interfaces that support rapid decision-making. Protection must extend across the entire attack surface, from cloud infrastructure to remote work endpoints, to create a unified defense against increasingly sophisticated threats.

Modern security platforms can automate initial containment measures, which will buy precious time for security analysts to investigate and respond to incidents. However, technology must be supported by clear protocols for incident communication and stakeholder coordination. While building these defenses requires significant investment, the potential costs of a serious breach can be markedly higher – both in immediate financial terms and long-term reputational damage.

The most effective rapid response strategies now incorporate real-time monitoring of the complete environment. In the most effective cases, this monitoring is bolstered by strong detection and response processes, which provide the correct amount of insights into each individual risk and the damage it is capable of causing. After, cyber teams can quickly understand the scope and nature of any security incident, facilitating faster and more targeted responses.

Looking ahead

A proactive security posture, supported by continuous adaptation and improvement, has become essential for survival. This means not only keeping pace with emerging threats but anticipating and preparing for tomorrow's challenges. It means being cyber safe – not just cyber secure. The current gap between attacker capabilities and defender response times represents one of the most pressing challenges in modern cybersecurity. However, organizations that combine cutting-edge mindset backed by the right technology with robust processes and a cyber safety-conscious culture can work to close this gap. The objective isn't merely to catch up with cyber attackers – it is to stay ahead of them.

Checkout our list of the best identity management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



via Hosting & Support

Comments

Popular posts from this blog

Microsoft, Google, and Meta have borrowed EV tech for the next big thing in data centers: 1MW watercooled racks

Web Hosting & Remote IT Support Liquid cooling isn't optional anymore, it's the only way to survive AI's thermal onslaught The jump to 400VDC borrows heavily from electric vehicle supply chains and design logic Google’s TPU supercomputers now run at gigawatt scale with 99.999% uptime As demand for artificial intelligence workloads intensifies, the physical infrastructure of data centers is undergoing rapid and radical transformation. The likes of Google, Microsoft, and Meta are now drawing on technologies initially developed for electric vehicles (EVs), particularly 400VDC systems, to address the dual challenges of high-density power delivery and thermal management. The emerging vision is of data center racks capable of delivering up to 1 megawatt of power, paired with liquid cooling systems engineered to manage the resulting heat. Borrowing EV technology for data center evolution The shift to 400VDC power distribution marks a decisive break from legacy sy...

Passing the torch to a new era of open source technology

Web Hosting & Remote IT Support The practice of developing publicly accessible technologies and preventing monopolies of privately-owned, closed-source infrastructure was a pivotal technological movement in the 1990s and 2000s. The open source software movement was viewed at the time as a form of ‘digital civil duty’, democratizing access to technology. However, while the movement's ethos underpins much of today’s technological landscape, its evolution has proven to be a challenge for its pioneers. Hurdles Facing Young Developers Open source models successfully paved a path for the development of a multitude of technologies, cultivating a culture of knowledge sharing, collaboration , and community along the way. Unfortunately, monetizing such projects has always been a challenge, and ensuring contributors are compensated for their contributions working on them, even more so. On the other hand, closed-source projects offer greater control, security, and competitive advant...

The Apple Watch ban is lifted, on appeal – but the reprieve might only be temporary

Web Hosting & Remote IT Support The Apple Watch ban story has developed quickly over the last week and a bit, and there's now a new twist: the US Court of Appeals is putting a pause on the US sales and import ban while it reviews the case, which means the Apple Watch 9 and Apple Watch Ultra 2 can go back on sale for the time being. "We are thrilled to return the full Apple Watch lineup to customers in time for the new year," an Apple spokesperson told TechRadar. "We are pleased the US Court of Appeals for the Federal Circuit has stayed the exclusion order while it considers our request to stay the order pending our full appeal." The watches in question are now once again available from "select" Apple Stores, and will also be going on sale from the Apple website from 12pm PT / 3pm ET on Thursday, December 28 (that's 8pm in the UK, and early on December 29 in Australia). All Apple Stores should have stock by the weekend. As for how long t...