The Top Cyberthreats of 2021

Top Cyberthreats of 2021

Insights from 1200 cybersecurity practitioners

We are happy to announce that the 2021 Cyberthreat Defense Report is here. Now in its eighth year, this report shares insights from a survey of 1200 IT security professionals in 17 countries across 19 industries. Sponsored by the world’s top cybersecurity firms, including PerimeterX, the report presents vital statistics and insights into organizations’ posture and preparedness for cybersecurity threats. Readers may use this report to better understand the threat landscape and to help shape their technology investment priorities for the next year.

The past year has been especially challenging from a cybersecurity perspective, with working patterns and personal interactions completely changed to take meeting, learning, shopping and even exercising online at astonishing rates. So while it is not surprising, it is still concerning that successful cyberattacks have made their biggest jump in six years, now up to 86% of all attempts. Nine out of ten organizations have experienced cyberattacks targeting web and mobile applications. Credential stuffing attacks and account takeover are the top concern with over 43% of respondents reporting it as a major concern. A close second on the list is personally identifiable information (PII) harvesting, which includes theft of login credentials and credit card numbers.

Another interesting new insight in this year’s report is the inclusion of third-party risk management, which emerged as the most challenging IT security function yet the one for which organizations are the least prepared. Modern software makes extensive use of third-party components and open source libraries often introduced without adequate security verification. This software supply chain vastly expands the attack surface for an organization and we have seen cybercriminals and nation-states exploit this in a few recent high profile attacks such as the ones on Solarwinds and Microsoft. This problem is exacerbated in the case of modern (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at: