Cybercrime opportunities are spiraling out of control, businesses say

x
(Image credit: Shutterstock)

Cybercrime opportunities are spiraling out of control, businesses say, as the expanding attack surface makes risk management a major challenge. 

Surveying more than 6,000 IT and business decision-makers in 29 countries for its latest report, Trend Micro said 73% of respondents are worried about the growing attack surface.

More than a third (37%) said their attack surface is “constantly evolving and messy”, while just half (51%) were able to fully define its borders. For 43%, it’s spiraling out of control.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Of all the different challenges businesses face, when securing their endpoints, visibility seems to be the biggest one. Almost two-thirds (62%) admitted to having blind spots, mostly in their cloud environments. The average company sees less than two-thirds (62%) of its attack surface, meaning crooks have more than a third of infrastructure to deploy viruses and other malware on.

Visibility and manual work

The bigger the company, the bigger the problems. Two-thirds (65%) of respondents said that for international enterprises, that work in different jurisdictions, securing the attack surface is an even bigger challenge. 

Besides visibility, Trend Micro has also identified manual labor as a major issue. A quarter (24%) are still mapping their systems manually, while roughly a third (29%) do it regionally, spawning additional silos and visibility gaps. 

“IT modernization over the past two years was a necessary response to the ravages of the pandemic, but in many cases it unwittingly expanded the digital attack surface, giving threat actors more opportunities to compromise key assets,” said Bharat Mistry, Technical Director at Trend Micro. 

Mistry claims a unified, platform-based approach can help minimize visibility gaps, enhance risk assessment, and better protect a complex, distributed IT environment. 

More than half (54%) of global organizations, the report has also found, don’t consider their risk assessment sophisticated enough. Less than half (45%) have a completely well-defined way to assess risk exposure, a third (35%) review it once a month, while less than a quarter (23%) review it daily.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Hacker Typing
Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Closing the cybersecurity skills gap
The critical need for watertight security across the IT supply chain
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 16 (game #1147)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 16 (game #378)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 16 (game #644)
Three iPhone 16 handsets on show
Apple could launch an iPhone 17 Ultra this year – but we've heard these rumors before
Super Mario Odyssey
ChatGPT is the ultimate gaming tool - here's 4 ways you can use AI to help with your next playthrough