As recent attacks have demonstrated, sufficiently motivated cybercriminals will eventually compromise a network perimeter or gain access to their target’s network environment. Accordingly, organisations must continually improve their ability to respond if a cyber hacker gets past their initial defences.
There is an asymmetric advantage that can tip organisations off if they look for the signs. Upon gaining initial access, hackers must gather information to better understand where to focus their efforts, and this reconnaissance can generate unusual network traffic or log data.
Regardless of cyber threat group or tactic, organisations can leverage this “home turf” advantage to effectively respond to potential breaches by temporarily disabling access to compromised accounts, endpoints, or servers, and physically quarantining compromised devices.
It is only by staying ahead of current threats and tactics that we can combat them. Organisations MUST PRACTICE their response processes against realistic adversaries (AKA under stress and in realistic circumstances) to identify response weaknesses or mistakes in their own systems.”Brenda VilenskiyCyber Services Manager, Los Angeles
Data presented in this cyber services snapshot is derived from global incidents reported to Beazley between Q1 2021 and Q3 2023.
The information set forth in this communication is intended as general risk management information. It is made available with the understanding that Beazley does not render legal services or advice. It should not be construed or relied upon as legal advice and is not intended as a substitute for consultation with counsel. Although reasonable care has been taken in preparing the information set forth in this communication, Beazley accepts no responsibility for any errors it may contain or for any losses allegedly attributable to this information. Non-insurance products and services are provided by non-insurance company Beazley affiliates and independent third parties. Separate terms and conditions may apply.