Search
Close this search box.

Podcast: 2023 Wrap Up Tips

Vivian Lee

Episode Summary

In this episode, Art Ocain and Vivian Lee reflect on the challenges of 2023 and provide insights for the upcoming year. With the holidays right around the corner, it’s a great time to look back to see what to improve on and what to be aware of going forward. Read on to see what they have to say about hacking exploitations in 2023, upgrading tools, and the holiday season.

Looking back on 2023

Third-Party Software Vulnerabilities: MOVEit Vulnerability Exploitation

A notable cybersecurity concern in 2023 was the exploitation of the MOVEit vulnerability, impacting various sectors, including banks and schools. Over 600 attacks targeted individuals with this vulnerability, shedding light on the critical importance of managing third-party software vulnerabilities effectively. The incident underscored the need for organizations to prioritize vulnerability management to mitigate potential risks associated with widely-used software.

Ransomware Resilience: Lessons from Major Attacks

Large-scale ransomware attacks took center stage in 2023, affecting prominent companies like MGM, Caesars, Clorox, and Johnson Controls. These incidents served as a stark reminder of the persistent threat of ransomware and its potential to wreak havoc across diverse industries. The aftermath of MGM’s experience highlighted the erosion of trust in high-tech services, emphasizing the urgency of robust cybersecurity measures to maintain customer confidence.

Upgraded and Upgrading Tools 2023

Strategies for Ransomware Resilience: The Crucial Role of Backups

As ransomware attacks become more sophisticated, having robust backup strategies is critical for organizations seeking to minimize the impact of an attack. Attackers are increasingly targeting backups, necessitating the adoption of multiple layers of backup solutions, both on-premises and in the cloud. The “layered lasagna” approach, coupled with the “321” or “3211” backup rule (three backups, two types of media, and at least one offsite, and one copy is immutable), emerged as effective strategies to enhance data recovery capabilities.

2023 Phishing and Deepfake Threats: Rising Complexity and Quality

The threat landscape witnessed a significant uptick in the complexity and quality of phishing and deepfake attacks. AI-driven phishing emails reached a point where they became indistinguishable from genuine communications, leveraging urgency and convincing language to deceive recipients. The introduction of advanced AI models, such as WormGPT and FraudGPT, empowered threat actors. They can automate and scale their phishing campaigns, posing a formidable challenge for individuals and businesses alike. For WormGPT, costing only $100/month, threat actors can write elaborate phishing emails and automate them to send to thousands of people at once.

Looking Ahead to 2024: Addressing Persistent Ransomware Threats

As we enter 2024, the persistence of ransomware threats remains a top concern for organizations. Preparedness is key, and businesses are urged to assess their backup, disaster recovery, and incident response plans. We recommend embracing a zero-trust approach. This means that every interaction is verified and trust is not assumed by default. This is a crucial strategy to enhance overall cybersecurity in the face of evolving threats.

2023 Holiday Cyber Threats: Exploiting Distractions and Reduced Vigilance

The holiday season brings with it an unfortunate increase in cyber threats as threat actors exploit distractions and reduced vigilance. For example, major retailers, in particular, become prime targets, with incidents often occurring just before high-profile events like Black Friday. Small businesses are not immune. The automation enabled by AI allows attackers to target a wide range of entities for financial gain.

Acknowledging the Sacrifices: Cybersecurity Teams During Holidays

Amidst the holiday festivities, it’s crucial to acknowledge the sacrifices made by cybersecurity teams working tirelessly to safeguard systems. The Security Operations Center (SOC), on-call, and incident response teams play a pivotal role in mitigating cyber threats, especially during peak times like the holiday season. Their vigilance and dedication are vital for preventing significant disruptions to businesses.

The Role of Cyber Insurance: A Safety Net in the Aftermath

The significance of cyber insurance cannot be overstated. In the aftermath of a ransomware attack, many businesses face financial ruin, making cyber insurance a crucial safety net. It is an investment worth making to navigate the aftermath of a breach effectively. Contrary to misconceptions, insurers aim to collaborate with businesses to mitigate risks, and the rising frequency of cyber incidents has led to a focus on essential cybersecurity controls, making it a mutually beneficial partnership.

Conclusion: Building Cyber Resilience Through Awareness

Fostering awareness within organizations about the omnipresent threat of cyber-attacks is critical. Encouraging open communication and creating a non-punitive environment for reporting incidents are key to building resilience. Implementing multi-factor authentication, regularly updating passwords, and educating employees on safe online practices remain fundamental strategies for cybersecurity.

As we reflect on 2023 and gear up for 2024, staying vigilant and adopting proactive cybersecurity measures are imperative for the cybersecurity landscape. Whether it’s addressing emerging threats, fortifying backup strategies, or acknowledging the dedication of cybersecurity teams, a comprehensive approach is essential for building cyber resilience in the face of evolving challenges.

Video Version

Listen to more episodes at www.airiam.com/podcast, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Recent Tech Layoffs Sharply Increase Insider Cybersecurity Threat

Video Overview As Layoffs Abound, HR and IT Teams Must Collaborate to Deter Insider Cyber Threats Airiam, a managed IT and cybersecurity company with a strong focus on cyber resilience, today revealed an increased risk of insider cybersecurity breaches
Avatar photo
Bill Bowman
>>Read More

What Is a Security Operations Center (SOC) in Cybersecurity?

The average data breach takes 277 days to identify and contain, costing companies an average of $9.44 million in the United States. For most businesses, that’s an unacceptable timeline and an impossible price tag. A Security Operations Center (SOC) aim

Bad Default Disk Management in Windows Server Backup

Windows Server Backup (WSB) is a pretty good backup solution for Windows Servers. It has the advantage that it is built to take advantage of all of Windows’ features. On the up side this means WSB can sensibly back up all information managed by Microso
Avatar photo
Anthony Lewis
>>Read More