Cyber Magazine March 2022 | Page 45

CYBER SECURITY

“ As companies recover from the pandemic , they are rightly sharpening their focus on organisational resilience and ESG credentials ”

CAROLINA KLINT RISK MANAGEMENT LEADER , CONTINENTAL EUROPE , MARSH
clients beyond simply encrypting files ; these included data leaks and distributed denialof-service ( DDoS ) attacks . Hacker groups are also contacting victims ’ clients or partners to get them to urge the victims to pay ransoms . Among the services offered is the collection of top executive information for blackmail .
Sophisticated cyber tools are allowing cyber threat actors to attack targets of choice more efficiently , rather than settling for targets of opportunity , highlighting the potential to carry out more goal-oriented attacks that could lead to even higher financial , societal and reputational damage in the future .
Increasingly sophisticated use of spyware technologies , were also highlighted in the report . These have allowed for targeted attacks against journalists and civil rights activists across geographies spurring a wave of political and industrial blowback in the form of government sanctions and lawsuits . A story which Cyber magazine has reported on many times in recent months . The ability to tailor attacks at will includes timing them for when cybersecurity teams and leadership could be distracted by other priorities , said the report , such as during peak COVID-19 outbreaks or a natural disaster . Cyber threat actors are also accessing higher-quality and more sensitive information from victims and deepfake technology is allowing cyber threat actors to improve social engineering ploys , proliferate disinformation and wreak societal havoc , especially at times of high volatility .
Carolina Klint , Risk Management Leader , Continental Europe , Marsh , said : “ As companies recover from the pandemic , they are rightly sharpening their focus on organisational resilience and ESG credentials . With cyber threats now growing faster than our ability to eradicate them permanently , it is clear that neither resilience nor governance are possible without credible and sophisticated cyber risk management plans . Similarly , organisations need to start understanding their space risks , particularly the risk to satellites on which we have become increasingly reliant , given the rise in geopolitical ambitions and tensions .”
cybermagazine . com 45