Comment

Key cybersecurity trends in pharma

As per GlobalData, ransomware, cloud security, and shoring up against supply chain threats are key trends driving the theme of cybersecurity.

Credit: Getty Images/the_burtons

Maintaining the security of IT systems is a constant struggle for organisations of all types. Cyberattacks are frequent and increasingly complex, perpetrated by those furthering a geopolitical cause or attackers intent on making money. In 2021, enterprises invested more in cybersecurity and cloud architecture due to employees working remotely during the pandemic. This also sparked a mergers and acquisitions (M&A) boom in the tech sector. 

Listed below are the key technology trends impacting the cybersecurity theme, as identified by GlobalData.

Ransomware and cybersecurity

According to the EU Agency for Cybersecurity (ENISA), there was a 150% rise in ransomware attacks from April 2020 to July 2021. ENISA has described the threat picture as the “golden era of ransomware”—partly due to attackers’ multiple monetisation options. Ransomware is a multi-faceted offensive campaign that also involves an attack on the brand reputation of the victim. Attackers are now operating secondary monetisation channels, auctioning exfiltrated data on the dark web. 

 A Cybereason survey found that 35% of businesses that paid a ransom demand paid between $30,000 and $1.4m, while 7% paid ransoms exceeding $1.4m. About 25% of organisations reported that a ransomware attack had forced them to close down operations for some time.

Cloud security

In the absence of strong security measures, cyber attackers can target the misconfigurations of security settings to steal cloud data. A March 2022 ‘Cloud Security Report’ from Check Point Software, based on a survey of 775 cyber security professionals, revealed that cloud security incidents were up 10% from the previous year, with 27% of organisations citing misconfiguration, ahead of issues like exposed data or account compromise. 

Cloud misconfiguration is typically caused by a lack of awareness of cloud security and policies; inadequate controls and oversight; too many cloud application programming interfaces (APIs) and interfaces to adequately govern the system; and negligent insider behaviour. 

Chip-based cybersecurity

Protecting chips from cyberattacks is becoming a necessity as chips end up in mission-critical servers and in leading-edge, safety-critical applications. As systems vendors and original equipment manufacturers (OEMs) increasingly design their own chips, rather than buying commercially developed devices, they are creating their own ecosystems and are, therefore, making security requirements much more of a home-grown concern. 

Macroeconomics is a key driver. The discovery in 2017 of high-profile security vulnerabilities—notably Meltdown and Spectre—meant chip vendors had to patch their security holes with software. That meant that customers, who had upgraded their servers to make the most of new processors, then lost much of their performance improvement. That, in turn, forced them to add more servers to process the same volume of data in the same amount of time.

Credit: Shutterstock/BeeBright

Cybersecurity supply chain threats

Cyberattacks targeting software supply chains are increasingly common and typically devastating. They came to the fore in 2020 when Russian hackers broke into SolarWinds’ systems and added malicious code to the company’s software system. 

SolarWinds provides system management tools for network and infrastructure monitoring, and approximately 33,000 customers use its Orion platform to manage IT resources. Ultimately the hack would turn out to be one of the biggest cybersecurity breaches of the 21st century, affecting thousands of organisations, including the US government. 

These attacks are effective because they can take down an organisation’s entire software supply chain and services, resulting in massive business disruption. Organizations can evaluate their attack surface and develop systems and infrastructure to defend against threats and manage vulnerabilities. 

Critical national infrastructure (CNI) threats

Cyber threats against CNI are increasing, and governments are taking steps to recognise them. The 7 May 2021 attack on the Colonial Pipeline fuel facility in the US alerted governments worldwide to the risks such an attack can bring to CNI. 

In Australia, the list of regulated CNI sectors has expanded to include higher education and research, communications, banking and finance, data, defence, energy, food and grocery, healthcare, space technology, transport, and water and sewerage. This formal expansion of CNI coverage will become a global trend as governments address cyber risks. 

CNI organisations are increasing anti-ransomware precautions, mandating multi-factor authentication for remote access and admin accounts, locking down and monitoring remote desktop protocol (RDP), and training employees to spot phishing attacks and other threats.

Artificial intelligence (AI) threats

AI is essential to information security. It can swiftly analyse millions of datasets and identify various cyber threats. But attackers can also use AI as a weapon to design and carry out attacks. AI can mimic trusted actors, copying their actions and language. Using AI means attackers can also spot vulnerabilities more quickly, such as a network without protection or a downed firewall. 

AI can also find vulnerabilities that a human could not detect, as bots can use data from previous attacks to spot slight changes. Cybercriminals can use data collected from a specific user or other similar users to design an attack to work for a particular target.

The growing use of managed cybersecurity services

Managed security services (MSS) provision is growing. According to the UK government’s 2022 Cyber Security Breaches Survey, 40% of businesses and almost a third of charities (32%) use at least one managed service provider. The core of an MSS provider’s (MSSP) business is in providing round-the-clock security monitoring and incident response for an enterprise’s networks and endpoints. However, as enterprise networks grow and evolve, support for other platforms, such as cloud-based infrastructure, has become a critical component of MSSP’s security portfolio. 

Using an MSSP is typically intended to augment or replace an organisation’s internal security team, while other services offered by providers include intrusion prevention systems (IPS), web content filtering, identity access management (IAM), privileged access management, vulnerability scanning, and threat intelligence. 

An offensive approach to cybersecurity defence

The increasing number of attacks against CNI has led to cyber authorities worldwide working more closely together. According to US Cyber Command, the US military plays a more offensive, aggressive role in combating digital threats. The UK now has a National Cyber Force, whose activities build on a previous National Offensive Cyber Program. France also has a cyber strategy with both defensive and offensive capabilities. 

This is an edited extract from the Cybersecurity – Thematic Research report produced by GlobalData Thematic Research. 

07/01/2024 17:15:18
  • Home | Cyber risk is higher than ever
  • Contents
  • Foreword
  • The state of cybersecurity in 2023
  • The history of cybersecurity
  • Pharma
  • The impact of cybersecurity on the pharmaceutical industry
  • Case studies: cybersecurity in the pharmaceutical industry
  • Latest news: cybersecurity in pharma
  • Q&A with GlobalData thematic analyst
  • Key cybersecurity trends in Pharma
  • Cybersecurity in pharma: securing the future
  • Deal activity related to cybersecurity in the pharmaceutical industry since 2018
  • Cybersecurity hiring trends in the global pharmaceutical industry since 2020
  • Cybersecurity patent applications in the global pharma industry since 2020
  • Medical
  • Mentions of cybersecurity in pharma industry company filings since 2020
  • The impact of cybersecurity on the medical device industry
  • Case studies: cybersecurity in the medical device industry
  • Latest news: cybersecurity in medical devices
  • Q&A with GlobalData thematic analyst
  • Cybersecurity: building resilience into the medical device market
  • Cybersecurity innovation: leading companies in patient identification and access
  • Deal activity related to cybersecurity in the medical devices industry since 201
  • Cybersecurity hiring trends in the medical devices industry since 2020
  • Cybersecurity patent applications in the global medical devices industry since 2
  • Mentions of cybersecurity in medical device industry company filings since 2020
  • GlobalData Thematic Intelligence
  • Mining
  • The impact of cybersecurity on the mining industry
  • Case studies: cybersecurity in the mining industry
  • Q&A with GlobalData thematic analyst
  • Lessons learned from Rio Tinto’s massive cyber-attack
  • Leading mining companies in the cybersecurity theme
  • Deal activity related to cybersecurity in the mining industry since 2018
  • Cybersecurity hiring trends in the global mining industry since 2020
  • Cybersecurity patent applications in the global mining industry since 2020
  • Mentions of cybersecurity in mining industry company filings since 2020
  • Steuler KCH Australia
  • Steuler KCH Australia Company Insight
  • Power
  • The impact of cybersecurity on the power industry
  • Case studies: cybersecurity in the power industry
  • Zero-trust cybersecurity – decentralised risk, everyone’s consequence
  • Cybersecurity innovation: Leading companies in power distribution system modelling
  • Leading power companies in the cybersecurity theme
  • Deal activity related to cybersecurity in the power industry since 2018
  • Cybersecurity hiring trends in the power industry since 2020
  • Cybersecurity patent applications in the global power industry since 2020
  • Mentions of cybersecurity in power industry company filings since 2020
  • Oil & Gas
  • The impact of cybersecurity on the oil and gas industry
  • Case studies: cybersecurity in the oil and gas industry
  • Latest news: cybersecurity in oil and gas
  • Q&A with GlobalData thematic analyst   
  • Risks, rackets and ransoms: the dark side of cybersecurity threats
  • Cybersecurity innovation: leading companies in VPN tunnelling for the oil and ga
  • Leading oil and gas companies in the cybersecurity theme
  • Deal activity related to cybersecurity in the oil and gas industry since 2018
  • Cybersecurity hiring trends in the global oil and gas industry since 2020
  • Cybersecurity patent applications in the global oil and gas industry since 2020
  • Mentions of cybersecurity in oil and gas industry company filings since 2020
  • Defence
  • The impact of cybersecurity on the defence industry
  • Case studies: cybersecurity in the defence industry
  • Military cyber security considerations moving to the fore
  • Q&A with GlobalData thematic analyst
  • Maximising cyber capabilities: US DoD's 2023 cyber strategy takes shape
  • Leading defence companies in the cybersecurity theme
  • Deal activity related to cybersecurity in the aerospace & defence industry since 2018
  • Cybersecurity hiring trends in the aerospace & defence industry since 2020
  • Cybersecurity patent applications in the global aerospace & defence industry since 2020
  • Mentions of cybersecurity in aerospace & defence industry company filings since
  • Sponsorship opportunities
  • Packaging
  • The impact of cybersecurity on the packaging industry
  • Case studies: cybersecurity in the packaging industry
  • Latest news: cybersecurity in packaging 
  • Q&A with GlobalData thematic analyst
  • Safeguarding the packaging sector against cyber threats
  • Avery Dennison takes leading role in cybersecurity
  • Deal activity related to cybersecurity in the packaging industry since 2018
  • Cybersecurity hiring trends in the packaging industry since 2020
  • Cybersecurity patent applications in the global packaging industry since 2020
  • Mentions of cybersecurity in packaging industry company filings since 2020
  • Auto
  • The impact of cybersecurity on the auto industry
  • Case studies: cybersecurity in the auto industry
  • Latest news: cybersecurity in the auto industry
  • Problematic paywalls, dissatisfied customers and rising cyber-threats
  • Cybersecurity innovation: leading companies in vehicle anti-theft systems
  • Deal activity related to cybersecurity in the automotive industry since 2018
  • Cybersecurity hiring trends in the automotive industry since 2020
  • Cybersecurity patent applications in the global automotive industry since 2020
  • Mentions of cybersecurity in automotive industry company filings since 2020
  • Food
  • The impact of cybersecurity on the consumer goods industry
  • Case studies: cybersecurity in the consumer goods industry
  • Latest news: cybersecurity in food
  • Leading consumer goods companies in the cybersecurity theme
  • Cybersecurity hiring trends in the food industry since 2020
  • Cybersecurity patent applications in the global food industry since 2020
  • Mentions of cybersecurity in food industry company filings since 2020
  • Apparel
  • The impact of cybersecurity on the apparel industry
  • Case studies: cybersecurity in the apparel industry
  • Latest News: cybersecurity in apparel
  • Fashion sector digitisation demands greater cybersecurity
  • Cybersecurity hiring trends in the apparel industry since 2020
  • Cybersecurity patent applications in the global apparel industry since 2020
  • Mentions of cybersecurity in apparel industry company filings since 2020
  • Next issue
06/30/2023 00:00:00