Ironic paradox: why cybersecurity is a constant battle

An abstract image of a lock against a digital background, denoting cybersecurity.
(Image Credit: TheDigitalArtist / Pixabay) (Image credit: Pixabay)

Cybersecurity is undoubtedly one of the most pressing topics on the business agenda. The number of malicious attacks is constantly growing, driven by the digitalization of operations. According to the IMF, it doubled since the pandemic. In 2023, the number of data breaches increased by 20 percent compared to 2022.

All these attacks can compromise sensitive information of both companies and their clients, halt business operations and result in significant financial losses for entities. According to an IBM report, the average cost of a data breach for a venture was $4.45 million in 2023. This is an all-time high, representing a 2.3 percent increase from last year and a 15 percent increase from 2020. Some companies experience an even heavier financial burden. For instance, US credit reporting agency Equifax paid more than $1 billion in penalties after a major data breach in 2017 that affected about 150 million consumers.

Moreover, malicious activities not only cause immediate financial losses for companies but also affect their performance in the long run. One significant consequence is that they undermine a company's reputation. This, in turn, can decrease a firm’s chances for future funding or compromise its client base growth. Additionally, organizations often have to patch a breach at a significant cost. For instance, one of the leading global marketplaces for in-game goods lost 11 million dollars worth of goods. This incident altered its revenue increase and repelled a significant portion of its audience. That happened as the company had to stop operations and strengthen the security of the platform.

Victor Zyamzin

Chief Business Officer at Qrator Labs.

Two forces

In an attempt to prevent these issues, businesses try to put increasingly sophisticated barriers in place for potential hackers. This is evident from the amount of spending on various cybersecurity tools. According to recent data, in 2023, it reached around $80 billion. In comparison, the total spending was $71.1 billion in 2022. Moreover, the number is expected to account for $87 billion this year.

Companies invest in a wide array of solutions, including advanced encryption, multi-factor authentication, and real-time threat detection systems. But here is when the ironic problem arises: with every advancement in cybersecurity, malicious actors innovate and escalate their tactics. They analyze technologies deployed by entities to protect their assets and find weak spots to breach protection.

For instance, the rise of quantum computing holds promise for stronger encryption methods. Yet, it also poses a potential threat, as cybercriminals may harness quantum capabilities to break current encryption standards. Similarly, multi-cloud architecture while offering increased risk resilience by spreading data across multiple platforms, also presents an expanded attack surface. The broader network perimeter introduces more points of vulnerability. No surprise that according to Microsoft, securing all cloud-native applications and infrastructure throughout their lifecycle is a challenge for many businesses. Their report shows that in 2023, the average organization had 351 exploitable attack paths that threat actors could use to access high-value assets.

This cat-and-mouse game, however, is evident among larger companies. What we see as another growing trend is that while big firms are increasing layers of protection, hackers are increasingly shifting their focus to small and medium enterprises. The latter usually have fewer resources to invest in cybersecurity. That makes them an easy target for malicious actors. As of 2023, 31% of small and medium-sized companies experienced a cybersecurity breach in the past 12 months alone.

Another paradox is that those malicious organizations are usually small-scale entities themselves, contrary to popular belief. Therefore, these so-called private sector offensive actors often have limited resources, compared to those of Microsoft or any other large firm. They, however, do not really need big budgets, because searching for vulnerabilities in a software is a much less complicated and cheaper process than creating it. Think of it this way: it is much easier to check 30 homeworks for a single teacher than to prepare the same amount of papers from scratch by one student. While there is no doubt that big malicious actors are indeed present in the field, their real influence on cybersecurity is much less than the impact of thousands or even tens of thousands of independent hackers.

Continuing journey

Given this paradox, businesses must adopt a holistic and proactive approach to cybersecurity. Organizations should invest in comprehensive security frameworks that encompass prevention, detection, and rapid response to any suspicious activities.

Employee training is also paramount. Human error remains one of the weakest links in cybersecurity. In fact, 95 percent of modern cybersecurity breaches are caused by people’s mistakes, such as setting weak passwords. Moreover, only one-third of breaches identified in 2023 were detected by a company’s own security team. This means that organizations must train their employees to recognize and respond to potential threats, which will help reduce the number of successful attacks.

Furthermore, collaboration is key. Public and private sectors must work together to share intelligence and develop unified strategies to combat cyber threats. Information sharing can lead to more robust defenses and a collective understanding of emerging threats.

It is important that all of this be done continuously. Companies must regularly monitor the cybersecurity field, adapt, and modernize—or even radically change—solutions, doing so faster than malicious actors. Slightly paraphrasing the famous words of cybersecurity expert Bruce Schneier, security is a process, not a one-time product.

We've listed the best patch management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Victor Zyamzin is the Chief Business Officer at Qrator Labs.

Read more
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
A padlock resting on a keyboard.
AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains
security
The true cost of a security breach
Latest in Pro
An image of network security icons for a network encircling a digital blue earth.
Why multi-CDNs are going to shake up 2025
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Millwall FC The Den
The UK's first football club mobile network is here - but you probably won't guess which team has launched it
Google Chrome
Google Chrome security flaw could have let hackers spy on all your online habits
Latest in News
Xbox Series X and Xbox wireless controller set to a green background
Xbox Insiders are currently testing a new Game Hub feature that looks useful, but I've got mixed feelings about it
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Microsoft Surface Laptop and Surface Pro devices on a table.
Hate Windows 11’s search? Microsoft is fixing it with AI, and that almost makes me want to buy a Copilot+ PC
Oura Ring 4
Activity tracking on Oura Ring is about to get a whole lot better, but I've got bad news about your step count
Google Pixel Buds Pro 2
Cleaned your Pixel Buds Pro 2 recently? If not, you might be getting worse sound
Google Maps on a phone being held in someone's hand
Google Maps is getting two key upgrades, for easier route planning and quicker access to Gemini AI