Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical Security

Navigating the threat landscape: The growing menace of cybercrime

By Jeremiah Salzberg
open laptop with code in dark room

Image via Unsplash

May 5, 2023

Cybercrime is one of the most pressing challenges facing businesses today. According to a recent report, the global annual cost of cybercrime is expected to top $8 trillion by 2023. As businesses embrace digital transformation and new ways of operating, they are also exposed to an increasing number of cyber threats like data exfiltration and ransomware. The rapid pace of technological change has made it difficult for companies to keep up with the latest threats and to stay ahead of the curve. 

How cybercrime has evolved

Cybercriminals have evolved, turning into well-established and well-funded organizations. They have also changed their methods, attacking in new ways and focusing on different types of industries. Like the corporations they target, they are reinvesting profits from basic ransomware attacks back into the business to expand their criminal enterprise and deliver new types of threats and attacks on organizations. They are targeting individuals, monitoring their social media, obtaining e-mail addresses, phone numbers and life events, and attacking them with precision using perfectly written spear phishing attacks. To build more advanced capabilities, they are doing what every corporation is doing. They are aggressively hiring the best talent they can find to design, build and test new attack services. Gone are the days where it was easy to identify a cyber-attack, businesses need to be cognizant of every little detail, link or ask they are receiving. 

As fast as businesses have embraced digital transformation and new ways of operating so, too, have their adversaries. 

Preparing internal security teams

For business security teams, this wave of innovation means new and more sophisticated attacks to manage. As security leaders have seen the rise in the importance of data, attackers have realized the value of it, too, and have focused much of their effort on acquiring it. Whether it is patient data from a healthcare system or employment data from a major corporation, acquiring data has become a priority. 

Once inside the target environment, attackers move laterally and vertically — patiently expanding access all the way to gaining domain admin and root access. With greater access, they target backup systems to delete, or compromise backups. Then they start exfiltrating data and data mining for valuable information such as credit card numbers or other sensitive personally identifiable information (PII). Then they lock up the data with encryption. 

To retrieve the data, an organization would typically need to pay a ransom. Now attackers have three demands and ways to collect more money: they will offer to decrypt an organization’s data, delete the exfiltrated data and/or return control of a domain back to the organization. Triple extortion, triple the pain. That is the result of tireless innovation, investment and engineering. 

One of the biggest challenges in combating cybercrime is the skills gap within the labor market. While cybercriminals are investing heavily in their own infrastructure and services, there is a shortage of qualified professionals in the field of cybersecurity. This has created a negative employment trend, with fewer people entering the security field and more companies struggling to find the talent they need to keep their systems secure. Companies should consider education as a key tool to combat this employment trend. By creating a cybersecurity education program internally, companies can invest in their talent, train individuals and teams to keep up with the evolving threat landscape.

Engaging a third party

IT teams are overwhelmed, and they have more products and tools than ever before that need to be constantly managed. One of the biggest cyber risks is an unmanaged or unmonitored tool. Large attacks can happen this way, due to a tool being configured incorrectly. Internal teams have the potential to use tools more effectively and optimize their spending towards finding a solution.

No amount of tools can help mitigate the problem of cybercrime without people. Companies cannot simply automate their way to security. People are the key to running and managing security systems, and without the right talent, companies will struggle to detect and respond to threats in a timely and effective manner.

One of the ways businesses can overcome the skills gap in cybersecurity is by adopting managed detection and response (MDR) strategies. MDR solutions provide companies with the resources they need to detect and respond to threats, even when their IT teams are exhausted. Engaging a third party can be a crucial step in removing the burden from internal teams. The goal of engaging a third party is to obtain an unbiased assessment of what a company has, evaluate the tools and determine that the tools are being used effectively.

Cybercrime is a growing problem that businesses cannot ignore and will need to incorporate into how they approach 2023 priorities. To stay ahead of the curve, companies need to invest in the right people and technology and adopt a proactive approach to security. By doing so, they can minimize the risk of cyberattacks and ensure the safety and security of their data and systems.

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cybercrime data breach costs ransomware talent gap third-party security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeremiah Salzberg is Chief Security Technologist at CDW.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare-screen

    Healthcare Organizations Must Balance the Growing Cybersecurity Threat Landscape with Meeting Regulatory Mandates

    See More
  • Computer open on desk beside cell phone

    Navigating the regulatory and compliance landscape of 2025

    See More
  • Manufacturing and The Cloud – Navigating the Evolving Security Landscape

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products

Events

View AllSubmit An Event
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing