Cyber security 2023: key threats and challenges (2024)

Renditions of Auld Lang Syne had barely finished before we heard about the first data breaches of 2023. PayPal, T-Mobile, JD Sports and Activision were just a few of the companies who suffered data breaches in January and February in a clear sign that threat actors don't intend to slow down this year.

In PwC's annual CEO Survey for 2022, almost two-thirds of UK CEOs said they were extremely or very concerned about cyber attacks impacting their ability to sell products and services. But what cyber threats are on the horizon for the year ahead?

To help answer this question we held a webinar, Cyber Horizons for 2023, to share our views on the emerging threats and trends for 2023. Our Taylor Wessing speakers were lucky enough to be joined by Oliver Crofton from cyber defence company BlueVoyant to discuss what BlueVoyant sees as the main threats this year.

The outlook for 2023

We kicked off by looking at the outlook for 2023. Oliver shared his short (or rather, long) list of threats BlueVoyant is monitoring including:

  • artificial intelligence-enhanced phishing attacks and tools
  • ransomware attacks, with new active groups emerging
  • supply chain attacks, both attacks on vendors and the interconnectivity between suppliers being used to breach companies
  • quantum computing and the threat it poses to standard encryption
  • state sponsored attacks and cyber warfare due to current geopolitical tensions
  • cryptocurrency theft and fraud
  • insider threats and the rising threat of employees stealing data to sell given the current difficult economic conditions.

Is insurance the answer?

Ed Spencer and Laura Singleton were up next to give their views on a big question - is insurance the answer? The market for cyber insurance is in a challenging place right now, and many businesses have seen premiums skyrocket leading them to question whether insurance is worth the cost of the policy.

So, is insurance worth the premiums? Cyber attacks are hugely expensive to deal with and can cost tens of millions of pounds. Companies need to pay for lawyers, specialist IT recovery firms, third party experts, the often overlooked cost of business interruption – and that's without considering the cost of any ransom which might be demanded.

Insurance offers businesses the opportunity to mitigate financial and legal risk, but is in no way a complete solution – it helps after the event but is not a preventative measure. It's ultimately up to businesses to decide whether the cost of insurance premiums is justified or whether they want to allocate more funds to prevention instead.

Our speakers discussed the pros and cons of both options, also emphasising that it's important for companies to fully understand what cover they've bought and that they comply fully with the policy wording.

Getting breach ready

Our webinar ended with Jo Joyce and Michael Yates discussing breach readiness. They covered the steps organisations should take to protect themselves using our audit, improve, and test methodology laid out below.

Audit – You should start by assessing your current level of preparedness through an audit. Engage with stakeholders across the business to work out general cyber awareness, then create a report to take to your board to outline any vulnerabilities or areas of concern identified.

Improve – If you already have a breach response plan and policies, update them for any areas identified in the audit stage. If you don't have them, prepare them! Ensure your plan is clear and comprehensive, and that everyone knows who's doing what, and at what stages, should the worse happen. Importantly, make sure your plan is stored somewhere you won't lost access to should your company be compromised.

In terms of those involved in your response, appoint your crisis response team in advance. Don't get stuck trying to assemble a team during a crisis, adding unnecessary pressure when you're already dealing with a multitude of competing priorities.

You should also prepare your reporting notices or litigation hold notices in advance. The decision to report can take up a huge amount of time when you're trying to deal with a crisis. And that's before you've even sat down to draft the documents you might need to submit. Prepare as much material in advance to save crucial time later.

Lastly, identify training opportunities for any knowledge gaps you've identified that you could plug with training.

Test – Once you've worked out what you need to do, and have improved your arrangements, it's best to run a breach simulation exercise. This will give you a chance to work out if your policies actually work, identify any practical issues with your response plan, and identify if anyone is missing from your breach response team.

How we can help

You can view the entire webinar below to hear the full discussion. If you'd like to know more about any of the topics discussed, or would like advice about proactive cyber defence in general, please get in touch.

Cyber security 2023: key threats and challenges (2024)
Top Articles
Is Pedialyte a safe treatment for my dehydrated dog?
Robyn Lively Biography, Age, Height, Husband, Net Worth
Craigslist Warren Michigan Free Stuff
jazmen00 x & jazmen00 mega| Discover
Amc Near My Location
Chicago Neighborhoods: Lincoln Square & Ravenswood - Chicago Moms
Blanchard St Denis Funeral Home Obituaries
Ati Capstone Orientation Video Quiz
Autozone Locations Near Me
The Many Faces of the Craigslist Killer
Nichole Monskey
Ap Chem Unit 8 Progress Check Mcq
Pro Groom Prices – The Pet Centre
Pwc Transparency Report
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
978-0137606801
Non Sequitur
Craigslist Edmond Oklahoma
Midlife Crisis F95Zone
Billionaire Ken Griffin Doesn’t Like His Portrayal In GameStop Movie ‘Dumb Money,’ So He’s Throwing A Tantrum: Report
Tygodnik Polityka - Polityka.pl
Free Online Games on CrazyGames | Play Now!
Loves Employee Pay Stub
Cocaine Bear Showtimes Near Regal Opry Mills
Ratchet & Clank Future: Tools of Destruction
Amih Stocktwits
Glenda Mitchell Law Firm: Law Firm Profile
Menards Eau Claire Weekly Ad
Https Paperlesspay Talx Com Boydgaming
Wisconsin Volleyball Team Boobs Uncensored
E32 Ultipro Desktop Version
Piedmont Healthstream Sign In
Hellraiser 3 Parents Guide
Ticket To Paradise Showtimes Near Cinemark Mall Del Norte
Receptionist Position Near Me
Creed 3 Showtimes Near Island 16 Cinema De Lux
R Baldurs Gate 3
Bfsfcu Truecar
Rainfall Map Oklahoma
Elanco Rebates.com 2022
Wisconsin Volleyball Team Leaked Uncovered
What Is Xfinity and How Is It Different from Comcast?
Orange Pill 44 291
24 slang words teens and Gen Zers are using in 2020, and what they really mean
Cheap Motorcycles Craigslist
Muma Eric Rice San Mateo
Oxford Alabama Craigslist
Red Dead Redemption 2 Legendary Fish Locations Guide (“A Fisher of Fish”)
Doordash Promo Code Generator
The All-New MyUMobile App - Support | U Mobile
Divinity: Original Sin II - How to Use the Conjurer Class
Az Unblocked Games: Complete with ease | airSlate SignNow
Latest Posts
Article information

Author: Kareem Mueller DO

Last Updated:

Views: 5691

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Kareem Mueller DO

Birthday: 1997-01-04

Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

Phone: +16704982844747

Job: Corporate Administration Planner

Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.