Outdated software , as well as insufficient encryption , can all be avoided if businesses practise diligent patching of their networks .
Unpatched endpoints are low-hanging fruit for ransomware attackers
Vulnerable endpoints and unpatched security frameworks are the most common points of entry for attackers to gain a foothold in businesses ’ networks . A 2023 report by Sophos found that among the 66 % of organisations who suffered ransomware attacks , 36 % of those attacks were carried out through vulnerabilities in devices – the leading cause for ransomware attacks in 2023 .
With the continually changing IT ecosystem , legacy security is not robust enough to secure a network for remote workers and businesses , nor protect the valuable data they hold . Technologies with system and network access , such as IoT devices and operational technology , are all access points that need to be regularly updated to avoid unintentionally weakening points of access for cybercriminals to exploit .
Outdated software , as well as insufficient encryption , can all be avoided if businesses practise diligent patching of their networks . The NCSC report , which reviewed their key developments and highlights , found that the two top methodologies employed in ransomware attacks involved crosssite scripting – an attacker embedding malicious scripts into trusted applications – and information disclosure . Both methods are largely exploitative of inefficient management systems , however , consistent renewal of software can mitigate these risks by ensuring your detection and response is upto-date . This preventative method is less costly than investing in additional physical infrastructure and layers of protection , aiming to reduce the frequency of attacks , speed up response times and reduce the
38 WWW . INTELLIGENTCISO . COM