This week: A cyberattack on the world’s largest bank shakes up the financial markets, a cargo of ransomware shuts down Australia’s largest port operator, big MOVEit-related breaches are still popping up and a look ahead at the cybersecurity challenges expected in 2024.
Learn more about growing supply chain risk for businesses and how to mitigate it in a fresh eBook. DOWNLOAD IT>>
The State of Maine
The State of Maine: Regional Government
Risk to Business: 1.627 = Severe
The State of Maine said that it has experienced a MOVEit-related data breach that impacts 1.3 million people. The informational website that Maine created about this incident says that the hack impacted at least ten state agencies, with the Maine Department of Health and Human Services and the Maine Department of Education hit the hardest. The state said a variety of information was exposed including a resident’s name, Social Security number (SSN), date of birth, driver’s license/state identification number and taxpayer identification number. For some individuals, certain types of medical information and health insurance information may be involved. Both a hotline and a dedicated website are available for people who think they may be impacted.
How It Could Affect Your Customers’ Business: Supply chain trouble isn’t just a problem for businesses; government agencies and non-profits also have suppliers
Kaseya to the Rescue: Every company needs to be ready for trouble with an incident response plan in place to minimize downtime and speed up recovery. This checklist can help. DOWNLOAD CHECKLIST>>
Washington Department of Transportation
Washington Department of Transportation: Government Agency
Risk to Business: 1.741 = Severe
Washington State’s Department of Transportation was hit by a cyberattack that knocked its website, cameras and app offline. Statewide traffic cameras were restored last Thursday morning, but the state’s travel map, mobile app, mountain pass reports, ferry vessel watch video feeds and online freight permits system are still being restored on both the agency’s app and website. The agency said that it is working with law enforcement to investigate the attack.
How It Could Affect Your Customers’ Business: Cybercriminals have been increasingly attacking infrastructure, opening the door to major problems for everyone.
Kaseya to the Rescue: An endpoint detection and response solution can help businesses stop the spread of a cyberattack fast. This checklist helps you find the right one. DOWNLOAD IT>>
Pacific Union College (PUC)
Pacific Union College (PUC): Institution for Higher Learning
Risk to Business: 2.603 = Moderate
Pacific Union College (PUC) in Napa County, California has informed officials that it has suffered a data breach. PUC told the Maine Attorney General’s Office that 56,041 people had data exposed in this April 2023 breach. Cybercriminals made off with a wide variety of data including personnel records, student files and financial data. The Trigonia ransomware group has claimed responsibility.
How It Could Affect Your Customers’ Business: Education has now become the top sector for ransomware attacks.
Kaseya to the Rescue: This infographic shows you the benefits you gain when choosing a managed security operations center instead of building your own. DOWNLOAD IT>>
Exploit: Supply Chain Attack
Sutter Health: Healthcare System
Risk to Business: 1.740 = Severe
California-based healthcare provider Sutter Health has announced that an estimated 840,000 patients may have had information exposed in a data breach at one of its vendors. The vendor, Virgin Pulse, informed Sutter Health that it had been impacted by a MOVEit exploit cyberattack earlier this year. The data was stolen in late May 2023. The healthcare system was quick to reassure patients that Social Security numbers and financial information were not exposed in the breach.
How It Could Affect Your Customers’ Business: Cybercriminals are expected to ramp up their efforts to detect and utilize zero-day exploits next year.
Kaseya to the Rescue: In The Comprehensive Guide to Third Party and Supply Chain Risk, you’ll learn how these risks emerge and what you can do to mitigate them. DOWNLOAD IT>>
What cybercriminal tricks do employees fall for in phishing simulations? Find out in this infographic. GET IT>>
Ireland – Electric Ireland
Exploit: Malicious Insider
Electric Ireland: Power Company
Risk to Business: 1.673 = Severe
Electric Ireland is informing its customers that their payment data may have been exposed in a recent insider-related data breach. The company said that an unauthorized worker at one of its call centers gained access to the financial and other details of 8,000 customers of the energy supplier. It cautioned that customers may wish to cancel payment cards that were on file. Electric Ireland is working with officials to resolve the incident.
How it Could Affect Your Customers’ Business: Every company needs to take smart precautions that enable it to detect malicious insiders and limit the damage they can do.
Kaseya to the Rescue: Learn about five red flags that can make it easier for IT professionals to detect a malicious insider at work in this infographic. DOWNLOAD IT>>
Find out how Datto EDR helps with Health Insurance Portability and Accountability Act (HIPAA) compliance. GET INFO>>
Australia – DP World
DP World: Port Operator
Risk to Business: 1.332 = Extreme
Australia’s largest port operator was forced to shut down its network following a ransomware attack last week. DP World Australia closed its Sydney, Melbourne, Brisbane and Fremantle port operations after detecting the attack Friday, resulting in a backup of cargo and containers stuck on the docks. Those three ports handle about 40% of Australia’s freight. Those ports stayed closed for three days, reopening on Monday, November 8.
How it Could Affect Your Customers’ Business: This kind of infrastructure hit can quickly become a disaster as shipping containers pile up and shipments of all kinds of goods become delayed.
Kaseya to the Rescue: Ransomware is a major threat to all organizations, not just businesses. Learn more about ransomware and get tips to mitigate risk in Ransomware 101. DOWNLOAD IT>>
Explore how AI technology helps businesses mount a strong defense against phishing GET INFOGRAPHIC>>
China – The Industrial & Commercial Bank of China (ICBC)
The Industrial & Commercial Bank of China (ICBC): Bank
Risk to Business: 1.202 = Extreme
The world’s largest bank, The Industrial & Commercial Bank of China (ICBC), has disclosed that its U.S. unit has experienced a ransomware attack that took down several of its systems The LockBit ransomware group has claimed responsibility. The attack left financial markets scrambling and disrupted the U.S. Treasury market. For a brief time, ICBC was unable to process trades, which at one point led to ICBC owing the Bank of New York $9 billion. Systems have since been brought back online.
How it Could Affect Your Customers’ Business: A successful attack on a major player in the finance sector can have an unpleasant wide-ranging ripple effect.
Kaseya to the Rescue: This checklist can help businesses determine if they’re making all the right moves to prevent email-based cyberattacks. DOWNLOAD IT>>
Singapore – Marina Bay Sands
Marina Bay Sands: Resort
Risk to Business: 2.716 = Moderate
Marina Bay Sands, a luxury resort and casino in Singapore, has experienced a data breach that may impact an estimated 665,000 people. The resort disclosed that customer information was compromised in a cyberattack it experienced on October 19 and 20, 2023. Attackers snatched data belonging to patrons including names, phone and mobile numbers, email addresses, country of residence and membership numbers and tiers. The incident remains under investigation.
How it Could Affect Your Customers’ Business: This attack comes as U.S. officials publish a warning that cybersecurity risk is heightened for casinos.
Kaseya to the Rescue: See how security awareness training helps keep cybersecurity threats from becoming cybersecurity disasters. DOWNLOAD INFOGRAPHIC>>
1 – 1.5 = Extreme Risk
1.51 – 2.49 = Severe Risk
2.5 – 3 = Moderate Risk
Risk scores for The Week in Breach are calculated using a formula that considers a range of factors for each incident
Find out about five of today’s biggest dark web threats to businesses in this infographic. DOWNLOAD IT>>
BullPhish ID brings you 10 updated phishing simulation kits
A wealth of updated phishing simulation kits is ready for your next training campaign with BullPhish ID. Train users to spot and avoid tricky cyberattacks with these plug-and-play phishing simulations, available now in the Phishing Kits section of the portal! See screenshots of them in the Release Notes.
Here’s the list:
- Barclays – Expense Card Options
- Clio – Important Message
- Bank of Cyprus – Account Update
- Binance – Giveaway
- eBay – Suspicious Activity
- eBay – Confirm Account Details
- LinkedIn – Password Reset v2
- Hulu – ToS Update
- Human Resources – Leadership Survey
- Credit Karma – Recent Dispute
How much is data really worth on the dark web? Find out in The IT Professionals Guide to the Dark Web! GET EBOOK>>
Datto’s Global State of the MSP Report: Trends and Forecasts for 2024
The new Datto Global State of the MSP Report: Trends and Forecasts for 2024 unveils intriguing trends that are shaping the landscape of MSPs, including:
- Competitive tips and secrets
- Winning priorities
- 2024 channel predictions
Did you miss… When Email Attacks: How To Develop Your Employees’ Phishing Defense Superpowers? DOWNLOAD IT>>
Learn how managed SOC gives you big security expertise on call 24/7without the big price tag. LEARN MORE>>
Cybersecurity Crystal Ball: Experts Predict the Biggest Potential Threats of 2024
As we get ready to step into 2024, the digital landscape continues to evolve, bringing with it both unprecedented opportunities and challenges. In the realm of cybersecurity, organizations need to start gearing up to face a new wave of threats. From sophisticated cyber-attacks to emerging technologies with potential vulnerabilities, the year ahead promises to be a dynamic battlefield for cybersecurity professionals. These are the threats that are anticipated to dominate the landscape in 2024.
This handy checklist of smart security practices helps businesses kick off the new year right! GET CHECKLIST>>
The 7 Biggest Potential Threats of 2024
These are the seven biggest cybersecurity threats that experts say could impact businesses in 2024.
Ransomware has been a persistent and evolving threat in recent years, and that’s not changing in 2024. In the Google Cloud Cybersecurity Forecast 2024, analysts predict that extortion operations will likely remain “the most impactful form of cybercrime to enterprises and societies worldwide”. Cybercriminals are expected to refine their tactics to maximize their extortion opportunities, incorporating advanced techniques such as AI-driven attacks and decentralized ransomware networks. The potential for attackers to leverage machine learning algorithms to target specific vulnerabilities and enhance the sophistication of their attacks poses a significant challenge for cybersecurity professionals.
Supply Chain Attacks
As organizations become increasingly interconnected, supply chain attacks will continue to be an area of focus for cybercriminals. Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains, a three-fold increase from 2021. Experts predict that malicious actors will target software and hardware supply chains to compromise multiple organizations simultaneously. With the potential to infiltrate widely used systems and applications, these attacks can have cascading effects, amplifying the scale and impact of cyber threats.
The biggest story heading into 2024 is the rise of Artificial Intelligence (AI) in cybersecurity on both sides of the coin. AI technology has been a game-changer in building a stronger, more resilient defense. But it has been just as useful for bad actors. Experts warn that cybercriminals will also exploit AI for malicious purposes. The use of AI in generating sophisticated phishing attacks will make it easier for cybercriminals to scale them and make them harder to detect. Generative AI tools like ChatGPT make it easy for cybercriminals to leverage social engineering in their phishing campaigns.
See how security awareness training stops the biggest security threats! GET INFOGRAPHIC>>
More Zero-Day Exploits
As technology becomes more complex, and software ecosystems continue to expand, the surface area for potential exploits expands as well. Cybersecurity experts anticipate that hackers will leverage advanced techniques and tools to discover and exploit these undisclosed vulnerabilities, posing a considerable challenge for defenders striving to stay one step ahead. Google analysts caution that adversaries are expected to increasingly use zero-day exploits to evade detection and maintain access for longer. Plus, they expect that bad actors will increasingly target edge devices and virtualization software, which are particularly challenging to monitor.
With Internet of Things (IoT) devices permeating various aspects of daily life, from smart homes and wearable gadgets to industrial sensors and healthcare devices, the attack surface for cyber threats expands exponentially. The more IoT devices communicate with each other, the bigger the risk grows. Security experts are sounding alarms, warning that the rush to embrace IoT technology without adequate safeguards could expose critical vulnerabilities. Forbes named IoT cyberattacks one of its 10 biggest cybersecurity trends that businesses need to prepare for in 2024.
Regulatory Compliance Challenges
With the growing emphasis on data privacy and security, regulatory frameworks are evolving globally. Cybersecurity experts predict that organizations will face increasing challenges in maintaining compliance with diverse and stringent regulations set by both regulators and cyber insurers. Navigating the complex landscape of data protection laws and ensuring adherence to regulatory standards will require a proactive and adaptive approach to cybersecurity governance.
Learn more about how the Kaseya Security Suite helps MSPs & their customers thrive in a dangerous world. GET BRIEF>>
Cyberattacks on Critical Infrastructure
As critical infrastructure systems become more interconnected and reliant on digital technologies, the risk of disruptive or damaging cyberattacks on critical infrastructure targets rises. Hackers and nation-state threat actors alike will endanger essential services such as power grids, transportation systems, manufacturers and healthcare facilities. The consequences of successful cyberattacks on infrastructure could be massive and disastrous. The increased use of Smart City technologies, including tools like big data, cloud computing and sensors that power city operations, may create new attack opportunities for bad actors to gain access to or carry out disruptive attacks against local government and critical infrastructure networks.
The U.S. Department of Homeland Security warned in its Homeland Threat Assessment 2024 report, “Domestic and foreign adversaries likely will continue to threaten the integrity of U.S. critical infrastructure—including the transportation sector—over the next year, in part because they perceive targeting these sectors would have cascading impacts on U.S. industries and the American way of life.”
Get ready for 2024
As we look ahead to 2024, the cybersecurity landscape continues to be turbulent and challenging. The evolution of cyber threats demands a proactive approach to security for businesses with the goal of increasing cyber resilience. By staying abreast of emerging technologies, fortifying defenses and fostering a culture of cybersecurity awareness in their organization or their client’s business, IT professionals can better equip themselves to tackle the formidable challenges that lie ahead.
Find the solutions you need to prepare for 2024’s challenges in Kaseya’s Security Suite
Kaseya’s Security Suite has the tools that IT professionals need to mitigate cyber risk easily and affordably.
BullPhish ID — This effective, automated security awareness training and phishing simulation solution provides critical training that improves compliance, prevents employee mistakes and reduces a company’s risk of being hit by a cyberattack.
Dark Web ID — Our award-winning dark web monitoring solution is the channel leader for a good reason: it provides the greatest amount of protection around with 24/7/365 human and machine-powered monitoring of business and personal credentials, including domains, IP addresses and email addresses.
Graphus — Automated email security is a cutting-edge solution that puts three layers of AI-powered protection between employees and phishing messages. It works equally well as a standalone email security solution or supercharges your Microsoft 365 and Google Workspace email security.
Kaseya Managed SOC powered by RocketCyber — Our managed cybersecurity detection and response solution is backed by a world-class security operations center that detects malicious and suspicious activity across three critical attack vectors: endpoint, network and cloud.
Datto EDR — Detect and respond to advanced threats with built-in continuous endpoint monitoring and behavioral analysis to deliver comprehensive endpoint defense (something that many cyber insurance companies require).
Vonahi Penetration Testing – How sturdy are your cyber defenses? Do you have dangerous vulnerabilities? Find out with vPenTest, a SaaS platform that makes getting the best network penetration test easy and affordable for internal IT teams.
Follow the path to see how Managed SOC heroically defends businesses from cyberattacks. GET INFOGRAPHIC>>
TODAY! Set-It-and-Forget-It Security Awareness Training Webinar
Why struggle with a security awareness training platform that constantly requires babysitting? Nobody has time for that. Join us on November 15, 2023, at 1 PM ET / 10 AM PT for a must-see webinar that shows you how to leverage automation to make training a breeze! REGISTER NOW>>
November 15: Set-It-and-Forget-It Security Awareness Training REGISTER NOW>>
November 16: Kaseya + Datto Connect Local Pittsburgh (Virtual) REGISTER NOW>>
November 23: Kaseya + Datto Connect Local Antwerp, Belgium REGISTER NOW>>
November 28: Kaseya + Datto Connect Local El Segundo REGISTER NOW>>
December 5: RocketCyber and Datto EDR Q4 Product Innovation Update REGISTER NOW>>
December 5: Kaseya + Datto Connect Local Orlando REGISTER NOW>>
Read case studies of MSPs and businesses that have conquered challenges using Kaseya’s Security Suite. SEE CASE STUDIES>>
Our Partners typically realize ROI in 30 days or less. Contact us today to learn why 3,850 MSPs in 30+ countries choose to Partner with ID Agent!
Check out an on-demand video demo of BullPhish ID or Dark Web ID WATCH NOW>>
See Graphus in action in an on-demand video demo WATCH NOW>>
Book your demo of Dark Web ID, BullPhish ID, RocketCyber or Graphus now!