Cyber extortion attacks have seen a marked surge globally in 2024, with a recent report revealing a 77% increase in victims compared to the previous year. The cybersecurity landscape remains fraught with risk, as multiple industries, including manufacturing, healthcare, and professional services, report frequent targeting by cybercriminals. Despite the sophisticated nature of these attacks, experts advise that effective organisational security can be achieved through comprehensive yet straightforward measures rather than solely relying on emerging technologies.

Scott Walker and Stuart Kennedy, respectively the CSIRT Manager and Senior Security Analyst at Orange Cyberdefense, shed light on the current cyber threat environment and the potential role of artificial intelligence (AI) in both exacerbating and mitigating risks. “Generative AI is the technology topic de jour and has already proven to be a powerful tool for both bad actors and cybersecurity professionals,” they state. On one hand, malicious actors, including state-sponsored groups, have leveraged AI to develop more convincing phishing schemes using techniques such as voice emulation and deepfake technology. Conversely, cybersecurity teams benefit from AI’s ability to enhance threat detection, improve incident response times, and support risk management protocols.

Despite AI’s promise, experts caution against viewing it as a cure-all for cybersecurity challenges. The technology’s infancy, combined with nascent implementation frameworks, means many organisations are still grappling with integrating AI safely into their systems. “Many organisations have yet to get a handle on AI and where it sits within their technology infrastructure,” according to the report. There is a risk that AI applications, if improperly managed, could become attack vectors themselves. To this end, companies are encouraged to prioritise establishing a strong baseline of classical security practices before adopting AI-driven strategies, including clarifying the systems to which AI tools connect and training employees on their appropriate usage.

The human element remains a critical vulnerability in cybersecurity defence. The report highlights that 37% of cyber incidents originate internally, often linked to employee error or insider issues. Effective risk mitigation is therefore reliant on fostering a culture of security awareness across all levels of an organisation. This involves integrating continuous training programmes that educate staff, contractors, partners, and suppliers about recognising and responding to cyber extortion, social engineering, and other security threats. The authors acknowledge potential resistance to such initiatives but emphasise that “security leaders must clearly demonstrate the consequences of inadequate security measures and effectively communicate their security strategy across the organisation to secure employee buy-in in every function.”

Establishing realistic goals for cybersecurity success is also advocated, recognising that completely eliminating incidents is unlikely in the face of evolving threats. Instead, companies should focus on measurable objectives such as reducing incident numbers, improving the speed of detection and remediation, and enhancing resilience through efficient backup and recovery processes. Emphasis should be placed on safeguarding highly sensitive data by developing strategies that minimise unauthorised access risks.

Crucially, the report stresses that cybersecurity should not rely on technology in isolation. Achieving strong defences requires the alignment of people, processes, and technology. Over-reliance on technological solutions without maintaining rigorous educational standards and procedural discipline can leave organisations vulnerable to significant breaches. Adapting to the changing threat landscape demands continuous evolution in security approaches supported by well-informed personnel and robust processes.

This comprehensive analysis was shared as part of TechRadarPro’s Expert Insights series, featuring contributions from leading figures in the technology sector. The perspectives provided reflect those of the authors and do not necessarily represent the views of TechRadarPro or its parent company.

Source: Noah Wire Services