The SolarWinds wake-up call
Why it’s time to tackle concentration risks
In late 2020, SolarWinds, a software company with over 300,000 customers issued a notification that potentially 18,000 customers downloaded a flagship product that may have been infected with a malicious code that gives threat actors backdoor access into their systems. This led to a slew of high-level government agencies and major corporations across North America, Europe, Asia, and the Middle East to check if their networks may have been exposed by suspected nation-state threat actors.
During Covid times, the high volume of ransomware attacks, highly public data thefts, or the concerns of remote system breaches have become more prominent. Cybercriminals and advanced persistent threat (APT) groups consistently target even the most secure environments. Despite the higher threshold to hack these environments, the payoff is considerable: rather than gaining access to one or several backend systems, this approach can give them entry to an entire industry or geography. This has led CISOs and their teams to prioritize their resources.
As many organizations identify these potential Cyber risks, there is a need for the right approach to minimize overall impact and design an industrious crisis response system for a more secured future.
For more information contact:
Canada Cyber Leader
Global Cyber Detect & Respond Leader
Cyber Threat Intelligence Leader
North America Cyber Cloud Leader