As we close out 2023, we at Security Boulevard wanted to highlight the most popular articles of the year.
2023 ForgeRock Breach Report underscores the need for AI-powered identity.
We are excited to announce the release of our fifth annual ForgeRock Identity Breach Report.
Our goal each year is to discover what's trending - how enterprises are being breached, how many records are being exposed, and how attackers are getting past security controls that cost companies roughly $88 billion a year.1.
As in previous years' reports, we have published our key findings, including the industries most vulnerable to attack, the rising costs, and the leading cause of breaches.
An emerging threat: they're using AI to devise new attacks.
Decisioning AI can also prevent attempts to gain unauthorized access by incorporating multiple contextual signals into the decision process, such as login location, IP network reputation, and the distance between login attempts and registered MFA devices.
Organizations with AI-powered identity and access management can detect unexpected activity, stopping intruders in real time as they try to authenticate.
They can also automate the process of eliminating over-provisioned access that enables attackers to use one compromised account to move laterally to higher-value targets.
The 2023 report shows how a tactic that emerged in last year's report is now routine: breaching high-value organizations through their third-party partners and vendors.
These attacks increased 136% from the year before and accounted for more than half of all breaches this time around.
Attackers know that hospitals, for example, face strict regulations for protecting patient data - but hospitals' suppliers may be less stringent.
In one breach alone, an accounts payable vendor supporting hundreds of healthcare organizations was the victim of a ransomware attack, which allowed attackers to access systems and documents containing patient-related data.
The breach affected more than 657 healthcare organizations and almost two million people.
Poorly protected integrations between third-party suppliers and the organizations that rely on them - weak access controls, vulnerable API integrations, or a lack of MFA for employee accounts - can be used to exploit third-party providers.
Without strong identity security and governance, API security, and a least-privileged access model, an attacker can breach one workforce user's account and move laterally, not just across a vendor's systems but also its partners' systems, to find and exploit valuable data.
Our report shows that ransomware and unauthorized access were the leading attack vectors in third-party service provider breaches.
The underlying theme of this year's report is that it takes only one compromised credential to pave the way for unauthorized access and the exposure of sensitive data, including customer data.
Implementing single sign-on, passwordless multi-factor authentication, and effective identity governance practices is vital for preventing unauthorized access.
Download the 2023 Identity Breach Report for all the data and to learn about ways you can protect your customers and your organization from breaches.
This Cyber News was published on securityboulevard.com. Publication date: Fri, 05 Jan 2024 13:43:04 +0000