Devices and accounts are highest-risk assets

Cyber Risk Report highlights critical vulnerability, offers new ways to prioritize risk management.

  • Thursday, 26th September 2024 Posted 1 year ago in by Phil Alsop

Trend Micro has urged network defenders to gain greater visibility into risk across their attack surface, after unveiling a new study* which provides granular metrics by region, company size, industry, asset type and more.

To read a full copy of the report, Intercepting Impact: 2024 Trend Micro Cyber Risk Report, please visit: https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/intercepting-impact-2024-trend-micro-cyber-risk-report

Jon Clay, VP of threat intelligence at Trend Micro: “Trend’s cyber risk report shares key insights on where risks are greatest within organizations such as weak security controls, misconfigurations, and unpatched actively exploited vulnerabilities. Shifting towards a more risk-based approach to cybersecurity—discovering the entire attack surface, using AI to calculate the actual risk, and providing mitigating controls advice—allows an organization to improve its cybersecurity posture like never before. This is a game changer for the industry.”

Using a risk event catalog, the Trend Vision One™ platform calculates a risk score for each asset type and an index for organizations by multiplying an asset’s attack, exposure, and security configuration by impact. An asset with low business impact and few privileges has a smaller attack surface, while higher-value assets with more privileges have a larger attack surface.

The following assets are the most at risk:

Devices: 22.6 million total devices, with 877,316 classified as high-risk.

Accounts: 53.9 million total accounts, with 12,346 classified as high-risk.

Cloud Assets: 14.5 million total cloud assets, with 9,944 classified as high-risk.

Internet-Facing Assets: 1.1 million total, with 1,661 classified as high-risk.

Applications: 8.8 million total applications, with 489 classified as high-risk.

The number of high-risk devices is much higher than that of accounts, even though there are more accounts in total. Devices have a larger attack surface—i.e., they can be targeted with more threats. However, accounts are still valuable as they can grant threat actors access to various resources.

Elsewhere, the report also found:

Americas has the highest average risk index among regions, with an average risk index rating of 43.4, driven by vulnerabilities in the banking sector and critical infrastructure and the region’s attractiveness to profit-driven actors.

Europe is the quickest region to patch vulnerabilities, indicating strong security practices.

Mining has the highest risk score of any vertical due to its strategic position in global supply chains and large attack surface.

Pharmaceuticals are the fastest sector to patch vulnerabilities by several days, reflecting the importance of protecting sensitive data.

The top detected risk event is accessing cloud applications with a high risk level based on historical application data, known security features, and community knowledge.

Old and inactive accounts, accounts with disabled security controls, and sensitive data being sent outside the network are other risk events with high event counts.

The report also uncovered many weak configurations that could lead to compromise, especially around security control settings.

As the threat landscape continues to evolve, organizations' ability to identify and manage risks is becoming increasingly crucial. The Trend Vision One™ platform, with its integrated Attack Surface Risk Management (ASRM), provides the necessary tools for comprehensive threat visibility and effective risk mitigation.

The following steps are recommended to help mitigate cyber risk:

Optimize product security settings to get alerts on misconfigurations.

When a risky event is detected, contact the device and/or account owner to verify the event. Investigate the event using the Trend Vision One™ Workbench search function to find more information about or check event details on the product management server.

Disable risky accounts or reset them with a strong password and enable multi-factor authentication (MFA).

Apply the latest patches or upgrade application and operation system versions regularly. 

Cato Networks joins Westcon-Comstor's AWS Marketplace

Posted 1 day ago by Sophie Milburn
Westcon-Comstor has added Cato Networks to its AWS Marketplace programme, expanding cloud procurement options for partners.

Atlassian introduces AI-powered 'Remix' for confluence

Posted 1 day ago by Sophie Milburn
Atlassian Corporation has introduced new AI features in Confluence that enable content to be transformed into formats such as charts, infographics,...
Cynomi has enhanced its platform with AI Insights and co-worker Agents, aimed at supporting cybersecurity service delivery for MSPs and MSSPs.

DXC Technology and ServiceNow forge AI partnership

Posted 1 day ago by Sophie Milburn
DXC Technology and ServiceNow have announced a collaboration to integrate AI into enterprise operations across global business functions.
Cloudera has announced updates to its hybrid data and AI platform aimed at supporting enterprise data environments.
WatchGuard Technologies has launched a new endpoint security portfolio that introduces changes to traditional EDR licensing models.

SonicWall reveals 2026 Cyber Protect Report

Posted 1 day ago by Sophie Milburn
SonicWall's latest report identifies the 'Seven Deadly Sins of Cybersecurity', focusing on protection outcomes crucial for small and medium-sized...
Hammer AI Works is an end-to-end ecosystem designed to support AI adoption across organisations.