NETWORKS & APPLICATIONS
REACTIVE RESPONSE
18 % of companies add security features after making big infrastructure changes only if they find problems , according to Netgate .
Examining the expanded surface As mentioned , the integration of all these new systems has significantly expanded the attack surface of organisations .
“ This growth is due to the utilisation of cloud infrastructure and SaaS applications as well as the growing need for multi-device connectivity to business services ,” explains Pete Shoard VP Analyst and part of the Security Operations team at Gartner . “ The growth of the attack surface means a larger number of more complex , and sometimes invisible attack vectors for security operations teams to defend as well as create better monitoring visibility for .”
This introduction of numerous new entry points , creation of complex environments , and centralising data in vulnerable architectures all contribute to the multifaceted nature of the issue .
Legacy OT systems often lack robust security features , making them vulnerable targets . Additionally , the convergence of IT and OT creates highly complex environments with numerous interconnected components , increasing the likelihood of security gaps and misconfigurations .
Many OT architectures also rely on centralised data repositories or control systems , which can become attractive targets for widespread attacks if compromised .
Same as with the cloud . The adoption of cloud services introduces additional risks , as cloud-connected devices can be exploited to launch attacks on critical infrastructure .
A 2023 State of Cyber Assets Report by cybersecurity company Jupiter revealed nearly 600 % annual growth in vulnerable cloud attack surfaces .
84 August 2024