• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

Cybersecurity Recap – May 2024

May 21, 2024 by Collin Knauer

Home » Blog » Cybersecurity Recap – May 2024

As May draws to a close, it’s essential to reflect on the significant cybersecurity developments that unfolded over the month. From compliance challenges to emerging threats and reports on data breaches, here’s a comprehensive overview of the most pressing stories.

Compliance Professionals Reflect on Cybersecurity Risk

A recent Wall Street Journal survey of compliance professionals revealed a concerning trend: cybersecurity threats have surged for businesses over the past year. The survey, involving approximately 300 compliance professionals, found that nine out of 10 companies reported an increase in cybersecurity risks, with nearly half citing a substantial rise. This trend was particularly apparent within midsize companies, with revenues ranging between $50 million and $1 billion. Major concerns among respondents included regulatory scrutiny, enforcement, and the digitization of business operations.

Recent high-profile hacks and regulatory changes, such as the Securities and Exchange Commission’s (SEC) requirement for prompt cyber breach disclosures, have raised concerns for companies across various sectors. Despite efforts to strengthen cybersecurity measures, compliance professionals face challenges in addressing diversity and inclusion issues, which have garnered less attention than other risk factors. Additionally, there’s a recognized need to enhance expertise in overseeing cybersecurity-related compliance, with many professionals acknowledging their proficiency as basic or novice.

However, there’s a growing recognition of the importance of promoting cybersecurity education. Many compliance professionals seek to improve their capabilities in response to evolving cyber threats. Despite the obstacles, there’s a prevailing sentiment that cybersecurity compliance programs, when effectively implemented, can significantly reduce risks and protect organizations from cyberattacks.

Implications of Gen Z’s Tech Focused Life

The lifestyle of Gen Z, which can be characterized by a strong reliance on technology, presents unique cybersecurity challenges unlike those from other generations. Gen Z’s online habits intersect with various cybersecurity risks, from digital-first communication preferences to extensive mobile device usage. Data shows that Gen Z’s preference for online communication platforms and virtual entertainment exposes them to phishing attacks, privacy breaches, and other cyber threats. Furthermore, the use of mobile devices as Gen Z’s primary means of accessing the internet raises concerns about unsecured Wi-Fi networks.

While advancements in technology certainly offer benefits, they also introduce new vulnerabilities that cybercriminals can exploit. As such, there’s a pressing need for increased mobile security solutions and comprehensive awareness campaigns to promote secure mobile practices among Gen Z. For instance, the popularity of online gaming among Gen Z presents its own set of cybersecurity challenges. From account hacking and scams to doxxing, gamers are vulnerable to real-world threats. Game developers and service providers must implement stringent security measures to protect online gaming environments and educate users about safe gaming practices. Parents and educators also play a crucial role in fostering open communication about cyber risks and empowering the younger generations to recognize and report suspicious activities.

Hackers Abuse Antivirus to Infiltrate Corporate Network

In a concerning discovery, one report suggests that hackers have exploited a popular antivirus solution for five years to infiltrate corporate networks. The security firm Avast uncovered GuptiMiner, a malware campaign targeting an antivirus software called eScan, which has been active since at least 2018. The attack leverages a vulnerability in eScan’s update mechanism, allowing threat actors to distribute backdoors and coin-miners on target networks.

The GuptiMiner infection chain is highly sophisticated, employing a variety of offensive techniques, including DNS manipulation, DLL sideloading, and payload signing with custom-trusted root anchor certification authority. Despite efforts to address the vulnerability, new infiltrations by GuptiMiner persist, highlighting the ongoing threat posed by outdated, vulnerable software. Avast’s disclosure of the vulnerability to eScan antivirus underscores the importance of prompt action in addressing cybersecurity vulnerabilities and safeguarding corporate networks against emerging cyber threats.

2024 Data Breach Investigation Report Overview

In 2023, the cybersecurity landscape witnessed significant shifts and challenges, as highlighted by various key findings. There was a staggering surge in vulnerability exploitation, nearly tripling from the previous year (2022), indicating a concerning trend in cyber threats.

Ransomware and extortion techniques emerged as prominent threats, collectively contributing to a third of all breaches, underscoring the growing complexity of cybercriminal tactics. Moreover, the prevalence of breaches involving a non-malicious human element emphasizes the critical importance of cybersecurity training and awareness programs.

A comprehensive analysis of 30,458 security incidents and 10,626 confirmed breaches revealed a two-fold increase from 2022 to 2023, reflecting the escalating intensity of cyber threats. Verizon’s extensive security infrastructure, managing over 4,200 networks globally and processing 34 trillion raw logs annually. Despite advancements in artificial intelligence (AI), challenges in large-scale vulnerability management persist, with organizations taking an average of 55 days to remediate critical vulnerabilities. The rapid detection of mass exploitations of vulnerabilities on the internet within five days underscores the urgency of proactive threat detection measures.

Furthermore, the involvement of third parties in 15% of breaches, representing a 68% increase, highlights the interconnected nature of cyber risk.

Contact SWK Today

Staying informed about cybersecurity developments is essential for protecting your organization against evolving threats. At SWK, we offer tailored solutions and expert guidance to help you navigate the ever-changing cybersecurity landscape. Contact us today to learn more about how we can support your cybersecurity needs and keep your business secure in an increasingly digital world.

Category: Blog, Cybersecurity, IT Services

Sidebar

Recent Posts

  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management
  • Minimize Tariff Impacts on Your Technology Costs in the Cloud

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense
Black laptop displaying Acumatica General Ledger journal transactions screen on a desk with coffee mug and notepad, showcasing the financial management interface on a computer in an office setting.

Acumatica General Ledger Training – Key Tips & Tricks

Read moreAcumatica General Ledger Training – Key Tips & Tricks

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand