In 2020, over 7 petabytes of new data dumps were discovered across the Dark Web. This included passwords, confidential proprietary information, and data that could make a significant impact on business. This is a huge increase from over 3 petabytes discovered in 2019 and points to some startling conclusions:
- Hackers have diversified their targets
- These discoveries are just the tip of the iceberg. More data might
- For some of the data, the victims could have ended up paying a ransom but still had their information exposed
While cybersecurity investments are going to increase in 2021, so are the threats. Misinformation, new variants of ransomware, new backdoors, and increasing sophistication of cyberattacks will together create new fault lines in the cyber armor of businesses. Beyond these trends, new batches of hackers and state-sponsored APT groups will also get active this year adding to the risks and threats already identified.
With the rollout of 5G gathering momentum, the focus will shift to targeting data at rest while infiltrating data in motion.
On the Operational Technology side, Information and Communication Systems (ICS) and controllers will face the brunt of multi-stage and deceptive cyberattacks. It is essential to understand these threats before you start addressing them at an institutional, leadership, employee, infrastructure, or vendor level.
Subex has been at the forefront of cybersecurity for over four years now. Last year, in December alone, we prevented over 17.3 billion sophisticated cyberattacks through our IoT and OT cybersecurity solution Subex Secure, our cyber deception offering Subex Secure Honeypot, and our managed security services.
Throughout 2020, we helped the cybersecurity teams of businesses offload their priorities to us while they focused on steering their organizations through some testing times.
We encourage you to continue investing in cybersecurity measures while increasing employee sensitivity, building, and evolving cyber resilience measures, and staying alert and vigilant.
Nat will be glad to help in case you wish to learn more. You can drop her a line: firstname.lastname@example.org.
Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defence tactics at close quarters.