The Attitude IT Today

Top Cybersecurity Trends in 2024 So Far...

Written by Emma Elkind | Oct 3, 2024 8:30:00 AM

Our team recently attended a very informative presentation by Miles Walker and Kaseya. I came away with seven cybersecurity threats and four important defense measures that companies should be implementing.

Kaseya completed a cybersecurity report at the end of 2023 and discovered that phishing Attacks are still the number one way, hackers are using to breach businesses. 90% of all hacks start with some kind of phishing email. According to the Annual Data Breach Report In 2023 data breaches increased by 78% and affected of 353 million individuals. Now we are seeing small to medium businesses being the main targets of attacks because they are easier to target and Zero Day Attacks are increasing.

Several Factors have contributed to Zero Day attacks being on the rise including; evolving cybercriminal tactics, overworked IT Teams, Modern Software Practices, and using temporary fixes instead of solving underlying problems. We wanted to highlight 7 Cyber trends to be aware this year.

1. Business Service Provider Attacks


Hackers attacking a business through a 3rd party providers vulnerability, this happens a lot in the healthcare industry because they are just starting to upgrade their systems. Over 100 applications across pharmacy, medical record, clinical, dental, patient engagement and payment services were affected. Ransom payments were made but cyber criminals leaked information and client photo’s, it also caused widespread disruption in healthcare services, payroll and prescription processing.

2. Ransomware That Affects Public Service


This happened in Hamilton, 60% of the municipality and 700 servers were encrypted. Taxes and fines had to be paid in person. Some city workers did not receive pay stubs and city departments are still struggling to get services up and running.

3. Destructive Attacks on Manufacturers


The attack on Varta AG shut down IT systems and stopped plant production for two weeks, this caused it s stock to plummet by 30 percent and the company still had to pay a ransom.

4. Hackers Looking for Specific Intelligence


Russian intelligence hackers used password spraying to breach Microsoft and compromise US Intelligence Data. Executives had a rare emergency directive to reset passwords and API keys. Microsoft is still facing heightened examination of its security practices.

5. Zero-Day Exploit


Due to a Citrix – Bleed vulnerability, hackers breached one of Xfinity’s servers and obtained customer information. 35.9 million people had their data exposed including passwords and Social Insurance Numbers. There were 3 Federal Suits filed against Xfinity for the leak.

6. School Disruption Hack


Schools are being hacked in order to gather information to use in other systems and find information they can sell to other hackers. It affects the school’s ability to access student records, email and phone and use computers on site.

7. Exploiting Cash or Data from Victims


Hackers will piggy back off other breaches and email victims direct asking for ransom. This happened when MediaWorks was breached and eventually their data was released on the dark web. You could be doing everything right but one of you partners might not be. More and more companies are doing their due diligence before signing with a vendor to make sure they have certain cybersecurity frame works in place.

AI is now everywhere it is important to be aware of its uses for cybercrimes- Deep fakes, Chat bots and Chat GPT are being used to craft phishing emails, spread misinformation, help less experienced hackers and create new malware. Some defensive measures we recommend is running a dark web scan regularly, Combine and EDR and a SOC- why are you not letting an expert manage your cybersecurity that is what you get when using s SOC, use a layered email security and conduct regular Security Awareness Training. Your team is not going to be able to become experts at identifying phishing emails if they are not being allowed to fail by training in a secure environment with their IT team first.

Implement NIST Security Framework

NIST uses a detailed framework to:

  • Identify Threats
  • Protect Company Assets
  • Detect Probes in the network
  • Respond and Act on Threats
  • Recover Lost Data

This Framework allows for workflow automation that leads to less downtime working through vulnerabilities. Having a NIST Framework combined with, Dark web scans, layered security implementing a SOC and EDR and having regular training. This will help protect not just your business but other vendors you work with and your clients and employees. The biggest take-away from the event for us setting a baseline is important to see how you can improve your cyber posture, being able to run scans on the dark web can alert you right away if any data has been leaked on the dark web and may be accessible to a bad actor, running a SOC and EDR gives company a no brainer way to protect their business, it is still important to have a multi-layer email protection even with phishing training.

If you need help starting your cyber journey let us know and we can walk you through your first steps. Call us today at 905-432-7751 If you are in the Durham area, 416-900-6047 if you are located in Toronto and 613-480-0652 If you are located in Eastern Ontario.