Page 11 - Data Security Edition 2022
P. 11
Threat Actors
Will Emerge With
New Tactics in 2022
Balaji Rao
Country Manager
India & SAARC, Mandiant
Based in the United States, safeguard from the damaging operations before deploying
Mandiant is a cybersecurity firm consequences of data theft and ransomware on the network and
that offers solutions to safeguard other acts of sabotage. then threaten to release the stolen
data.
b u s i n e s s e s a g a i n s t Intelligence-led cyber security
cyberattacks while relying on e n a b l e s t e a m s t o r e d u c e Additionally, there is a rampant
cutting-edge technology and organizational exposure to growth of multi-faceted extortion
i n d u s t r y - l e a d i n g t h r e a t attacks through the prioritization operations where attackers are
i n t e l l i g e n c e . I n 2 0 2 1 , t h e of alerts, effective data security now threatening to expose
strategies, and investments that breaches and publish sensitive
c o m p a n y a n n o u n c e d t h e align them to defend against the data to increase the urgency for
appointment of Balaji Rao to threats that matter most. A victims to pay. Mandiant Threat
strengthen its presence in the developed and mature security Intelligence has identified more
India & SAARC region. Below, Rao p o s t u r e t h r o u g h i m p r o v e d than 800 alleged multi-faceted
explains how organizations are t e c h n o l o g y s u p p o r t s t h e extortion victims who likely had
now constantly navigating the implementation of the best data stolen. This number continues
t h r e a t l a n d s c a p e a n d p r a c t i c e s a n d f u n c t i o n a l to grow as more operators have
cyberattacks that lead to data readiness of organizations. started websites to support data
breaches. Data Security Trends publishing and extortion demands.
Mandiant observed that threat Data Security Implementation
The Need for a Robust Data Challenges
Security Strategy a c t o r s a r e c o m b i n i n g
ransomware operations with data Some of the challenges are the lack
Companies are constantly of ability to internally detect and
navigating the evolving threat theft extortion. Ransomware discover intrusions within their
landscape and cyberattacks threat has grown significantly security environments. Another
leading to data breaches. throughout the past decade, and challenge would be the lack of
Protecting and retaining data it will continue its upward trend. effective backup and restoration
integrity should be prioritized to - Malicious actors steal sensitive
data during these - process by organizations resulting
in financial repercussions -
March 2022