Most organisations are now considering cybersecurity as their top priority as the modern threat landscape tremendously evolved. Threat actors have discovered new ways to act maliciously against companies and are now targeting different industries.
Apricorn, considered a leader in providing hardware-based 256-bit encrypted external storage products, predicts that threat actors may look to act against intellectual property, hack automobiles, and maximise economic challenges in the new year.
According to Jon Fielding, managing director of EMEA for Apricorn, “Driven by nation-state threats, market competition and internal threats, many companies will face an increased risk of losing valuable intellectual property (IP) or having research and development (R&D) efforts thwarted by data leaks. There needs to be a push for data encryption across all levels of business.”
Fielding added that for most of the IT leaders who responded to Apricorn’s 2022 UK IT Security Survey, half of the participants’ companies now require data encryption, both at rest and in transit.
Apricorn also predicts that automobile hacking to access drivers’ data may increase. The company recommends that automobile companies invest more in protecting driver data, ranging from dashcam footage, and GPS location to credit card and sensitive information stored in the driver’s cell phone connected to the car via Bluetooth.
Roxanne Libatique, an Insurance Business New Zealand journalist, also noted that Apricorn “expects organisations to face challenges by resource constraints brought by economic challenges, staff shortages, and tech layoffs.” Fielding added, “This scarcity of resources may put additional strain on IT teams leading to increased cybersecurity risks. I predict that an increase in cybersecurity breaches and data loss events may occur due to IT teams being stretched too thin.”
With these threats, the company foresees that the necessity for data restoration may be a likely scenario in the new year. Apricorn recommends that backup and recovery strategies be intentional, practised and effective, as corrupted or compromised data will only hinder recovery efforts.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...