2022 State of the Threat: A Year in Review
In 2022, ransomware remained the most prevalent form of attack. In investigations by Secureworks® incident responders, the median time between initial access and ransomware detonation dropped to 4.5 days in 2022, compared to 5 days in 2021. Meanwhile, nation-state dynamics like those observed in conflicts between Russia and Ukraine shifted rapidly.
Secureworks Counter Threat Unit™ (CTU) researchers have noted a general trend: the size of organizations falling victim to these threats is growing smaller over time. Smaller organizations are likely to be less well-resourced, making them a softer target and one that is less likely to bring in specialist incident response services after the event.
Read our comprehensive report to understand key findings and recommendations your organization can take to counter threats.
Read More
By submitting this form you agree to Secureworks contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Secureworks web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: AIM, Analytics, Apple, Applications, Cloud, Cloud Storage, Collaboration, Connectivity, Databases, DDoS attacks, Email, Email Client, ERP, Firewall, Hardware, Linux, Malware, Microsoft Exchange, Microsoft Office, NAS, Network, Open Source, Operating System, Operating Systems, RAID, SaaS, SAN, Server, Software, Spam, Storage, Virtualization, VPN
More resources from Secureworks
2022 State of the Threat: A Year in Review
In 2022, ransomware remained the most prevalent form of attack. In investigations by Secureworks® incident responders, the median time between ini...
Reduce Alert Fatigue in Your IT Environment
Security teams are tasked with managing a huge volume of alert logs, and this noise can overwhelm any team – let alone an individual analyst. A r...
Detect and Stop Advanced Threats Faster to Re...
As cyber adversaries become more sophisticated, organizations are forced to constantly upgrade their security operations in order to stay a few ste...