eBooks/eGuides

repelling cyberthreats

Issue link: https://insights.oneneck.com/i/1093576

Contents of this Issue

Navigation

Page 3 of 10

Effec ve cybersecurity requires extensive IT exper se and technological power that can drama cally compound both costs and risk for enterprises. And with each successive cloud deployment, the poten al for vulnerability follows. As a company's cloud infrastructure grows and diversifies, added endpoints, APIs and integra ons create more entry points for intrusion and risk—both from external and internal sources. By 2023, the total number of DDoS a acks worldwide will be 15.4 million (Cisco Annual Internet Report 2018-2023, Cisco Systems). Factor in that internal security risks, whether an inten onal act from a disgruntled employee or an accident like losing a USB drive, account for nearly three- quarters of new security threat instances, and it's no wonder that IT leaders list security as one of their top cloud-related concerns in survey a er survey (Flexera 2021 State of Cloud Report). A large part of that concern emanates from simply not knowing what they don't know. IT execu ves who don't specialize in cybersecurity will have blind spots in their security plans and opera ons that can leave their organiza on exposed. WHERE DO CYBER ATTACKS COME FROM? Common A ack Vectors: • Malware (48.6%) • Vulnerability (10.2%) • Targeted hack (2.8%) • Account Takeover (13%) • DDoS (1.7%) May 2021 Cyber A acks Sta s cs. Hackmageddon.com Mul ple Deployments, Mul plied Risk 4 oneneck.com 02

Articles in this issue

Links on this page

Archives of this issue

view archives of eBooks/eGuides - repelling cyberthreats