2022 Cyber Threats

The annual Heimdal Threat Report reveals that the “new normal” of remote work has made organisations susceptible to novel attack vectors and significant changes in the threat landscape, let’s find out more.

The most frequent types of malware encountered by Heimdal’s SOC team were worms, Trojans, and infected JS malware. Despite their seemingly legitimate appearance, these types of malware are actually designed to wreak havoc by destroying, disrupting, or stealing data, and can quickly take over a device.

Upon closer examination of the cybersecurity landscape in 2022, it became apparent that Heimdal clients were effectively protected against significant cyber threats, thanks to Heimdal’s integrated corporate security suite. Download the Heimdal® CyberSecurity & Threat Intelligence Report 2023.

Cyber Threat Report 2023 Key Takeaways

1. 100% of organisations that reported brute-force attempts were conducting fewer third-party patches (less than 100 improvement-carrying packages in the last 90 days) or had more legacy OS software.

2. Government, Health, and Transportation are 16.3% more likely to be targeted compared to other industries. (Based on Heimdal® data 2022).

3. 23% of connections to networks are malicious. Therefore, security awareness training and endpoint protection are needed to reduce cyber risk. (Based on Heimdal® data 2022).

4. Organisations using automatic patching can apply five times more OS-based patches compared to those relying on manual patching. (Based on Heimdal® data 2022)

5. Organisations using automatic patching can apply two times more third-party-based patches compared to those relying on manual patching. (Based on Heimdal® data 2022).

Questions?
020 3637 6095
support@geekheads.co.uk