Reinforce Your Trusted Advisor Position with Your Customers and Prospects
Verizon recently released its Verizon Data Breach Investigations Report (“DBIR”), and our cybersecurity expert, James Morrison, is in love. This report, released annually, provides a treasure trove of insights into the ever-evolving world of cyber threats.
The entire report is worthy of a read. However, we asked James to flag the insights that stuck out to him. Each can trigger a conversation about cybersecurity solutions with your customers and prospects.
James Morrison’s Top Six Key Takeaways from the 2023 DBIR
1. The main avenue of attacks remains unchanged – stolen credentials, social engineering, and exploitation of vulnerabilities.
A critical takeaway from the DBIR is the confirmation that the primary avenues of cyber-attacks have mostly stayed the same. Stolen credentials, social engineering tactics, and the exploitation of vulnerabilities continue to be the preferred methods of attackers. Use this insight to talk to your customers about the importance of strong passwords, multi-factor authentication, and ongoing security awareness training.
2. Twenty-four percent of data breaches involved ransomware, regardless of the victim’s size.
Ransomware continues to wreak havoc in the cyber landscape, as it is involved in 24 percent of data breaches, regardless of the size of the victim organization. Use this insight to talk with your customers and prospects about the urgent need for robust backup, disaster recovery solutions, and advanced endpoint protection measures. You can leverage this insight to underscore the criticality of proactive cybersecurity.
3. Financial motives remain the top reason for cyber-attacks, and state-sponsored attacks remain very low statistically.
While state-sponsored attacks often make headlines, the DBIR reminds us that financial motives remain the primary driving force behind cyber-attacks. Understanding the motivations of bad actors can help you tailor your recommendations to ensure your customers are protected from the threats that most commonly target businesses like theirs.
4. There has been a four-fold increase in the number of breaches involving cryptocurrency.
The DBIR highlights a concerning trend: a four-fold increase in cryptocurrency breaches. With the growing popularity of digital currencies, cybercriminals are actively targeting cryptocurrency wallets and exchanges. James suggests that you emphasize the importance of secure cryptocurrency storage practices, such as cold wallets and robust encryption techniques, to safeguard their digital assets.
5. The most exploited vulnerabilities are seen on internet-facing servers, and Log4J remains a significant issue.
The DBIR underlines the significance of securing internet-facing servers, as they remain the most exploited vulnerability. This finding highlights the importance of regular patching and vulnerability management practices. James suggests you leverage this insight to recommend comprehensive vulnerability scanning and patch management solutions to mitigate the risk of server-based attacks. Additionally, the report mentions the ongoing challenge posed by the Log4J vulnerability, reinforcing the need for urgent action to address this critical issue.
6. Email remains the most likely path into an environment because it still works.
Despite the rise of new attack vectors, email remains the most favored entry point for cybercriminals. The DBIR reinforces that phishing and email-based attacks are still prevalent and effective. Capitalize on this insight by promoting robust email security solutions, including advanced threat protection, encryption, and user training to identify and avoid malicious emails.
If you have attended AMP’d, AMP’d MasterClass, AMP’d Solo Cybersecurity, ScanSource Channel Connect or any of our cybersecurity-related SE Webinars, then you know we are passionate about making sure YOU are seen as the technology hero in your customer’s eyes. We want your prospects to call YOU when they are thinking about their cybersecurity needs.
Think about how you can use any or all of these insights to guide your customer’s cybersecurity strategies. Addressing the unchanged avenues of attack, the rise of ransomware, financial motives behind attacks, increasing cryptocurrency breaches, securing internet-facing servers, and the continued risk of email-based attacks is a surefire way to get their attention in today’s environment.
Additionally, remember to access the helpful resources at Intelisys University to continue learning and managing your marketing-related outreach.