A recent survey conducted by Trend Micro reveals significant challenges faced by UK organisations in managing cybersecurity risks linked to unknown or unmanaged IT assets. The study, which involved 100 cybersecurity leaders across the United Kingdom, highlights that 70% of organisations have experienced security incidents connected to these hidden or unmanaged assets.

Key factors contributing to the expanding attack surface include the widespread adoption of generative AI tools, continued remote working practices, and the increasing presence of Internet of Things (IoT) devices. These developments have intensified the complexity of organisational cybersecurity environments.

Concerns around unauthorised technology, referred to as Shadow IT, are prominent, with 38% of respondents citing this as a major cause of security blind spots. These blind spots arise when IT assets are not centrally overseen or even known to IT teams, creating significant vulnerabilities within organisations.

Compounding these challenges, 96% of UK cybersecurity leaders expressed worry about employees’ use of third-party AI tools, indicating that such external technology use is exacerbating attack surface complexities.

Despite these acknowledged risks and incidents, a substantial 82% of those surveyed stated that their current cybersecurity resources are adequate to tackle attack surface challenges and mitigate business risk. On average, organisations devote 29% of their cybersecurity budgets to managing attack surfaces. However, the survey points to a "clear disconnect" between this confidence and the frequency of breaches linked to unknown IT assets.

Analysis of survey responses suggests this disconnect may be attributed to varying degrees of proactivity within security teams. Over a quarter (28%) of respondents admitted their organisations respond to cybersecurity issues primarily on a reactive basis. Only 43% reported actively employing attack surface management tools.

In terms of risk management strategies, periodic audits remain common practice, with 52% of UK security leaders conducting such reviews or relying on external assessments. Conversely, fewer than half (48%) regularly update and patch their software and systems. The study warns that a reactive approach and infrequent auditing increase the likelihood that organisations will be disadvantaged if compromised through unmanaged IT assets.

Supply chain security also features prominently in the findings. More than half (56%) of respondents now regularly assess third-party vendors for security vulnerabilities and incorporate security checks into onboarding processes. This reflects a heightened awareness of supply chain risks following major cyber incidents in recent years.

The survey also indicates strong adoption of penetration testing and vulnerability assessments, with 89% of cybersecurity leaders reporting monthly testing and 38% conducting these assessments weekly. Such measures are intended to strengthen defences against risks posed by third-party suppliers.

Bharat Mistry, Field CTO at Trend Micro, commented on the findings, saying, "The enterprise AI genie is out of the bottle and IT security leaders need to get a grasp on the implications. Attack surfaces are expanding through both authorised and unauthorised uses of IT. A proactive strategy leveraging techniques that anticipate and limit cyber threats before they cause damage is the only answer. Our study shows real progress that's being made in managing growth in attack surfaces via third-party suppliers, but also food for thought on where our industry can go further to establish truly proactive defences that tackle new AI-based threats as well as attack surface blind spots that act as an entry point for attackers."

The research was carried out by Sapo Research as part of a global study encompassing more than 2,200 respondents across 21 countries, with the UK cohort consisting of 100 cybersecurity professionals. The study aims to shed light on how organisations are navigating the increasing complexities of their cybersecurity environments, including dealing with the rise of Shadow AI and other evolving threats in the attack landscape.

Source: Noah Wire Services