As 2020 is finally and fortunately coming to an end, here at Bitdefender, we’re already exploring what will happen next year and getting our defenses ready. While our crystal ball might not be perfect, here is a shortlist of what we expect in the 2021 cyber-threat landscape:
All about Virtualization and Cloud Security | Recent Articles:
Most Industries Plan Substantial Investments in IT to Support Remote Workers in 2021
- Organizations don’t want to be caught off-guard again by a COVID-like crisis
- Most industries believe work-from-home is here to stay and are prearing to invest accordingly in security
- Some industries will invest way over 100 percent in their IT departments
Bitdefender Endpoint Detection and Response, The Vaccine You Need for Advanced Threats
- Advanced targeted threats are designed with a defined purpose to infect and remain undetected in a network over a prolonged period
- Endpoint Protection has fundamental limitations as advanced threats easily circumvent traditional defenses by using varied tactics, techniques and procedures (TTPs)
- Bitdefender Endpoint Detection and Response (EDR) provides superior performance, security analytics and incident management capabilities to enjoy a privileged spot amongst competition
Half of Cybersecurity Seniors Have Changed Their Defense Strategies Due to COVID-19
- 23% admitted experiencing a remote attack or disruption since the beginning of the pandemic
- The greatest perceived threats are malware and insider threats
- 29% of security seniors said they have invested in new tools but still feel inadequately protected
61% of IT Security Leaders Say Remote Workers Have Caused a Data Breach This Year
- Employees are 85% more likely today to leak files than pre-COVID
- 59% of IT security leaders say insider threat will increase or ‘significantly’ increase in the next two years
- More than half of organizations have no insider risk response plan
- 40% of organizations don’t assess how effectively their technologies mitigate insider threats
Bitdefender’s Response to FireEye and SolarWinds Breaches and Recommendations for Organizations
The recent breaches making headlines is a stark reminder that no organization is immune to cyberattacks. We firmly stand by FireEye and SolarWinds and commend them for their transparency and rapid response to help minimize impact to those affected. Like us, they fight the good fight.
Half of Businesses Say Remote Work Pays Off, But Security Is Becoming a Major Concern
- Nearly a quarter of organizations worry about security risks introduced by users working from home
- Only 27% reported full or complete visibility into user activity
- Users are mixing personal and corporate use on their work laptops and are more susceptible to phishing attacks at home
How to Choose a Reliable Security Licensing Provider - Seven Steps for Your Integration’s Success
The security landscape, as well as the fast-growing market behind it, can be highly unpredictable. From adaptable threats to surges in demand, there are countless ways your company can be caught off guard. And never was this trend more visible than in the past year, when the increase in remote work prompted an avalanche of cyber threats.
- Demand for digital transformation is driving low code development platforms.
- While line-of-business workers creating software alleviates development team burdens, it can increase risk.
- Enterprises must ensure that they are managing all apps in their portfolio.
While economies were slowed down by the recent health crisis, the same cannot be said about cyber crime. Threat actors used this period as a proving ground, a time to test and perfect their tools. As the ‘’digital continuum’’ became a reality, cyber attacks diversified and exploited new ways of compromising systems.
- Attackers spoof the Microsoft.com domain
- Lookalike websites used to steal credentials
- Microsoft doesn’t implement the DMARC protocol
-
With malware increasingly adopting the “as-a-service” business model, Advanced Persistent Threat (APT) groups that have traditionally been state sponsored, may see tremendous value in using the business model as well.
-
Organizations of all sizes and verticals should consider evaluating and updating their threat models to include APTs, or risk falling victim to data breaches and industrial espionage.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (8)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (25)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (82)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- April 2021 (3)
- March 2021 (18)
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)