Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

How to be proactive in the face of growing cyber threats

By Tyler Farrar
hacker cyber threat
May 5, 2022

Throughout the pandemic, cyber adversaries have been honing their skills, developing an array of new techniques to penetrate networks and steal sensitive data. Organizations are struggling to keep up with the increasing number and sophistication of attacks, with the average cost of a data breach increasing by $1.07 million in 2021.

As a result, security teams are overwhelmed by alerts, false positives and negatives, and are forced to respond to security incidents as they occur, rather than securing the environment beforehand. Without proactive cybersecurity efforts, organizations will struggle to carry out an effective incident response. Read ahead to learn what proactive security practices look like for organizations of all sizes.

Developing a baseline of normal behavior

Many people mistakenly believe that a breach starts when it is first detected, but it often begins much earlier than that. According to the 2021 Ponemon/IBM Cost of a Data Breach Report, it took an average of 287 days for a breach to be identified, which means adversaries have a significant amount of time to analyze systems and plan their attack while remaining undetected.

Adversaries have become adept at hiding in plain sight as legitimate users, making them nearly impossible to detect without a baseline for normal behavior. A baseline helps organizations establish parameters for what normal, day-to-day traffic on the network looks like. This is crucial because in the event of a breach, the everyday employee is likely to be targeted. Having a baseline makes it possible to detect anomalies much faster and before the intruder can do serious damage to a company’s infrastructure and data.

Applying automation to the problem

A cybersecurity framework is as good as its response time, and with attacks growing in scale and sophistication, automating processes has become essential. Baseline behavior can only do so much when an organization has cumbersome investigation and report processes in place. Automated risk visibility enables organizations to contain a breach by:

  • Analyzing web, domain name system (DNS), file and endpoint activity for anomalies in behavior
  • Identifying and investigating breaches from past and new kinds of malware and using automated response strategies
  • Analyzing file composition and blocking those seen as malicious from being copied or from executing 
  • Automatically extracting key evidence and links to utilize as evidence in a case

Automating security practices can save businesses time, effort, and most importantly, money. According to the U.S. Financial Crimes Enforcement Network, ransomware payments totaled $590 million in the first half of 2021 alone, more than the $416 million paid throughout the whole of 2020. If that wasn’t enough, the Sophos State of Ransomware 2021 report found that 92% of organizations that pay ransoms fail to obtain all of their stolen data, showing the consequence of turning to a last resort as opposed to a proactive, automated response. With these figures on the rise, it’s a question of when, not if, an organization will be next. Automation ensures that when the time comes, an organization can respond with threat detection and countermeasures.

Security threats are a moving target

There is no single ideal solution or cybersecurity technology. To achieve their goal, a motivated attacker will employ any and all tactics, techniques and procedures (TTPs) available to them; they don't always cross an endpoint or send an email. Hackers can overcome even the most sophisticated of identification systems and elude legacy antivirus software.

According to the 2021 Microsoft Digital Defense Report, the company stopped 31 billion identity attacks and 32 billion email threats, compared to 9 billion endpoint threats (daily). In addition, the amount of malware varieties is changing from year to year. SonicWall reported that in 2020, the number of malware variants detected grew by 62%. Identity, email, endpoint security and antivirus are all important, but they are not enough.

A complete solution

Being proactive involves more than just having stopgap solutions and hoping they are never needed. As security leaders have heard countless times before, hope is not a strategy.

The modern adversary is motivated by the reality that it only takes a single successful attempt, capable of launching several automated attacks on a target to achieve so. By merely clicking a malicious link or attachment, workers and trusted third parties can become unassuming accomplices. These compromised insiders provide attackers with everything they need to deploy their attack.

Organizations must have a cybersecurity framework in place that works around the clock to detect, analyze and flag any abnormalities that could signal a coming attack. This means having a baseline for normal user behavior, automating security practices, and staying up to date with emerging trends and developments from adversaries. Only then can businesses be prepared for the inevitable cyberattacks that may threaten data and networks.

KEYWORDS: cyber security threat cyber threat endpoint security hacking identity (ID) management security automation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tyler Farrar is the Chief Information Security Officer (CISO) at Exabeam.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • State Governments, Courts Tighten Security in the Face of Growing Threats, Anger

    See More
  • cybersecurity

    How to Minimize the Risk of Insider Threats (Physical and Cyber) During COVID-19

    See More
  • cyber security freepik

    The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing