When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Cybersecuritybreaches can result in significant financial losses for organizations.

Senior Managing Director for Verizon Security Consulting Services.

Security padlock in circuit board, digital encryption concept

Costly attack patterns

It isnt realistic to eliminate all cybersecurity risks.

Ransomware and pretexting are among such attack patterns.

This attack pattern can put enormous pressure on organizations that cant afford downtime.

For these organizations, there is no good option.

Pretexting is not only costly but also increasingly prevalent, accounting for a quarter of financially motivated cyberattacks.

High-risk industries

Industries with critical infrastructures or sensitive information are often high-value targets for threat actors.

As alluded to in the previous section, ransomware can be especially devastating here.

The impact can cascade down the supply chain, with the costs potentially growing exponentially.

It can affect a manufacturers relationships with suppliers and retailers, which may erode its standing in the industry.

With pressure mounting, a manufacturer will likely feel growing pressure to pay the ransom.

A new revision of the NIS2 directive to enforce better online grid and Information System security within critical companies.

The threat of human error

Often, threat actors have unwitting accomplices: a companysemployees.

Employees may be fooled by pretexting tactics, resulting in a BEC attack.

Sometimes, they dont even fall prey to a cyberattack.

As a manufacturer, your worst-case scenario may be a production line being held hostage by a threat actor.

Enhanced access controls may help prevent these and other mistakes.

Within debates about digital identities, non-human identities (NHIs) are often overlooked and marginalized.

NHIs encompass a wide range of digital identities linked to applications, services, and machines.

They say it takes money to make money.

Well, it also takes money to save money.

We’ve featured the best identity theft protection.

The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.