Bollywood News

Hidden Risks in European initiative IT assets

In order to maintain the growth rate in Europe, the USA and China, it goes for a walk to expand its digital operations. This effort not only scales the operating IT view of the continent, but also to present new layers of complexity.

Only in 2022 EU 127 billion € poured In order to increase rescue and flexibility plans after Covid-19, to investments related to digital.

However, as businesses grow to meet these ambitions, and a changing culture of work after Covid, usually results in a fragmented IT infrastructure. This makes it difficult to monitor and monitor CT assets including centrality, websites, databases, APIs, BYO-and IoT devices. Weak visibility on publicly -open systems increases the chances of weak and non -monitrated entry points, expand the surface of the attack, and make organizations more vulnerable to cyber threats.

How much weaken the institutional cyber flexibility in Europe, and what role does the external attack surface management (EASM) play in the address of this challenge?

Europe’s IT assets face growing security gaps

According to several reports, beings exposed, unknown security deficits, lack of control, weak monitoring and stolen identity information are some of the most threatening cyber security concerns of many businesses in Europe.

Outpost24’s workThe key French industries showed that more than 20% of the safety risks determined that more than 20% of the safety risks, which examined the security of the attack surface of more than 19,000 assets. While the pharmaceutical industry has the most critical security deficits (25.4%), the transportation sector found that almost half of the known exploitation deficits (49.5%) were critical or very high. Although financial institutions have a stronger malicious defense, they noted the most leaked identity information on the Dark Web.

The situation is also anxious Dach regionReviewing 20,000 assets here revealed important gaps. Health institutions faced the highest percentage of critical security risks (23.2%), while 43.53% of the financial sector web servers had incorrect configurations and exposed precise data.

This increasing vulnerability in IT infrastructure shows the lack of correct monitoring and monitoring of digital assets used by companies. Unfortunately, these bad actors are the type of IT environment in which they like to throw any day, any day.

The real threat is not in the number of IT assets, but in the weaknesses

Cyber ​​security risks for large enterprises are not just a matter of scale. Although there are more employees and internet connection devices than smaller companies, it lies in the vulnerability of the security infrastructure.

A great labor force increases the risk of human error according to Proofpoint’s CISO’s 2024 sound reportIt is responsible for 74% of all cyber violations.

However, beyond the human error, large businesses rely on complex supply chains containing many suppliers and partners, making them primary targets for attacks such as Equifax and those who hit Solarwinds. A World Economic Forum and Accenture questionnaire He found that 54% of large organizations saw the safety of supply chain as the biggest obstacles of cyber resistance.

In addition, creating multiple input points for attackers is the difficulty of managing a large public beings such as websites, database servers, APIs, cloud services, ports and IoT devices.

The number of external IT assets is not really a problem, but the amount of weaknesses that are not noticed over time. A new Outpost24 benelux easm benchmark report It shows that more than 18% of observed IT assets have critical or high -risk security deficits. More than 20% of the analyzed web servers showed different levels of errors, which shows signs of false configurations that attackers can exploit.

If it is collected, the depth of these threats can lead to financial losses, operational disruptions and reputation damage. 2024 of IBM Cost of the data violation report Shadow CTs containing IT increased costs by 10% to an average of 4.88 million dollars.

GDPR violations, especially if data violations are not reported because of poor monitoring and management of CT components, may lead to a fine of up to 20 million € or 4% of global income.

This requires businesses to increase their surface management efforts to increase their public assets continuously and help them secure their existence.

ROLE OF Foreign Attack Surface Management (EASM)

External attack surface management (EASM) keeps organizations in front of the public by providing continuous visibility to public CT components.

Outpost24’s EASM solution offers a 7/24/365 asset discovery and risk priority, and scans IP addresses, websites, ports and DNS passively to quickly detect new security vulnerabilities in known and unknown assets.

EASM helps to reduce security vulnerabilities by closing visibility gaps; It is a fundamental concern emphasized with industrial research of companies such as ESG and Forrester.

One of the biggest challenges faced by enterprises is to effectively prioritize risks. To address this, Outpost24 benefits from AI-supported tools and cyber threat intelligence feeds to assess the domain name property and security criticism and exploitation to help focus on real threats instead of spending time in assets that do not play a work-critical role. It performs better than its competitors by scanning more frequently, covering all ports and integrating new threat detection methods faster.

The findings from the Benelux report point out the need for European enterprises to adopt strong EASM strategies, while automatic and continuous monitoring is now a necessity to secure shadow CT and critical business assets.

Matching Easm with continuous penetration test A flexible package It enables organizations to balance the width and depth in cyber security efforts while strengthening the general security postures.

Solution

The scale of your CT environment should not be a responsibility. It should be a proof of the growth of your organization. However, you need an effective EASM solution to maintain control on your IT infrastructure.

Outpost24 offers a holistic approach to the external attack surface management, which allows you to watch assets, control the shadow, and gain the necessary visibility to defend against the arising threats. You can start by taking one Free attack surface analysis today.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button