Cyber Magazine August 2024 | Page 75

CYBERSECURITY

“ The cost to compromise a business is going down ”

CARL WEARN HEAD OF THREAT INTELLIGENCE ANALYSIS AND FUTURE OPS , MIMECAST
and even decreased the ability to confirm the veracity of who sent a message .
Although the way of entry for most ransomware attacks will be through IT-related means , this is rarely the end goal .
“ Most ransomware attacks are still IT-related , with Enterprise IT being the primary mechanism to enter a network even when the desired effect is to disrupt the OT environment ,”
Magpie Graham , Principal Adversary Hunter and Technical Director at Dragos explains . “ That said , there is growing evidence that demonstrates the desire for criminal actors to expand into extorting the OT network , and evidence gained during Incident Response engagements that shows criminal actors behaving differently when within the boundaries of an OT network .”
This raises an interesting question on how to balance often spread-thin cyber resources in propping up defences .
Resisting ransomware Many of the same good practices and cyber hygiene we see implemented on the Enterprise IT side , such as conducting security awareness training for all employees , can be helpful in terms of protecting OT environments too . cybermagazine . com 75