Page 11 - Data Security Edition 2022
P. 11

Threat Actors



                                                  Will Emerge With




                                                  New Tactics in 2022









                                                  Balaji Rao
                                                  Country Manager
                                                  India & SAARC, Mandiant



    Based  in  the  United  States,  safeguard  from  the  damaging  operations  before  deploying

    Mandiant is a cybersecurity firm  consequences  of  data  theft  and  ransomware  on  the  network  and
    that offers solutions to safeguard     other acts of sabotage.                 then threaten to release the stolen
                                                                                   data.
    b u s i n e s s e s   a g a i n s t  Intelligence-led  cyber  security
    cyberattacks  while  relying  on  e n a b l e s   t e a m s   t o   r e d u c e  Additionally,  there  is  a  rampant

    cutting-edge  technology  and          organizational  exposure  to  growth  of  multi-faceted  extortion
    i n d u s t r y - l e a d i n g   t h r e a t   attacks  through  the  prioritization  operations  where  attackers  are
    i n t e l l i g e n c e .   I n   2 0 2 1 ,   t h e   of  alerts,  effective  data  security  now  threatening  to  expose
                                           strategies,  and  investments  that  breaches  and  publish  sensitive
    c o m p a n y   a n n o u n c e d   t h e   align them to defend against the  data  to  increase  the  urgency  for
    appointment  of  Balaji  Rao  to       threats  that  matter  most.  A  victims  to  pay.  Mandiant  Threat
    strengthen  its  presence  in  the     developed  and  mature  security  Intelligence  has  identified  more
    India & SAARC region. Below, Rao       p o s t u r e   t h r o u g h   i m p r o v e d  than  800  alleged  multi-faceted

    explains  how  organizations  are  t e c h n o l o g y   s u p p o r t s   t h e  extortion  victims  who  likely  had
    now  constantly  navigating  the  implementation  of  the  best  data stolen. This number continues
    t h r e a t   l a n d s c a p e   a n d  p r a c t i c e s   a n d   f u n c t i o n a l  to  grow  as  more  operators  have

    cyberattacks  that  lead  to  data     readiness of organizations.             started  websites  to  support  data
    breaches.                              Data Security Trends                    publishing and extortion demands.
                                           Mandiant  observed  that  threat  Data Security Implementation
    The Need for a Robust Data                                                     Challenges
    Security Strategy                      a c t o r s   a r e   c o m b i n i n g
                                           ransomware operations with data         Some of the challenges are the lack
    Companies  are  constantly                                                     of  ability  to  internally  detect  and
    navigating  the  evolving  threat      theft  extortion.  Ransomware           discover  intrusions  within  their
    landscape  and  cyberattacks           threat  has  grown  significantly        security  environments.  Another
    leading  to  data  breaches.           throughout the past decade, and         challenge  would  be  the  lack  of
    Protecting  and  retaining  data       it  will  continue  its  upward  trend.   effective  backup  and  restoration
    integrity should be prioritized to -   Malicious  actors  steal  sensitive
                                           data during these -                     process by organizations resulting
                                                                                   in financial repercussions -
                     March 2022
   6   7   8   9   10   11   12   13   14   15   16