{"id":68619,"date":"2023-01-11T15:17:41","date_gmt":"2023-01-11T20:17:41","guid":{"rendered":""},"modified":"2024-02-27T17:36:35","modified_gmt":"2024-02-27T22:36:35","slug":"2023-cyber-security-predictions","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","title":{"rendered":"Commvault\u2019s 2023 Cyber Security Predictions"},"content":{"rendered":"\n

2022 was a BIG year for Cyber Security.  According to Cyber Security Hub, more than 4100 data breaches were publicly exposed with a number of high-profile attacks including Twitter, Optus and WhatsApp.<\/p>\n\n\n\n

In today\u2019s world, bad actors are well organized, informed and also persistent with the volume and speed of attacks increasing.  Their motives are changing, with data leakage, exfiltration, theft and restructure being top objectives causing data damage to now be the top concern of IT decision makers.<\/p>\n\n\n\n

So what does 2023 hold? We\u2019ve gathered thoughts from experts across Commvault to answer that very question. <\/p>\n\n\n\n

\n
\n
\"\"<\/figure><\/div><\/div>\n\n\n\n
\n

Industry-Wide Shift to Proactive, Early Threat Prevention <\/strong><\/strong><\/strong>
\u2013 Matt Tyrer<\/strong><\/strong><\/strong><\/h4>\n<\/div>\n<\/div>\n\n\n\n

In short, businesses will need and begin to implement proactive solutions to constantly monitor their environment to catch threats and enable early warning\/response.  Bad guys are getting in, and we aren\u2019t knowing about it early enough. <\/p>\n\n\n\n

From a cyber security and threat defence perspective, the industry today could be essentially divided in two approaches: <\/p>\n\n\n\n

    \n
  1. Preventative Measures:<\/strong> These vendors are your perimeter defence vendors like firewalls, anti-virus, SIEM\/SOAR tools, along with other data loss prevention (DLP) and intrusion detection\/prevention solutions. Even the newer identity access management (IAM) security vendors, who are adding key security functionality to control who can see what in your environment, can be grouped in here. They are all the locks on your doors and windows actively working to keep the bad guys out of the house so that they can\u2019t even start the fire. <\/li>\n\n\n\n
  2. Reactive Measures:<\/strong> These tend to be the storage and most conventional backup vendors who are focused on protecting the data itself. Aiming to ensure it is available for recovery via table stakes features like immutability and anomaly detection (threat hunting) in the backups. These solutions are the sprinkler system and fire alarm \u2013 by the time they are triggered your house is already on fire and your only response is triage and disaster recovery. <\/li>\n<\/ol>\n\n\n\n

    Don\u2019t get me wrong, both of these are critical parts of a layered security posture and strategy but there is a gap which where early warning lives.  It\u2019s the abilities to better respond when a breach occurs, while not waiting for data damage to be done before recovery is kickstarted.<\/p>\n\n\n\n

    This is why my prediction is an industry wide shift to more PROACTIVE warning systems<\/em>, helping companies fill gaps between their preventive and reactionary toolsets.    <\/strong><\/strong><\/p>\n\n\n\n

    Thankfully, Commvault is ahead of this game with our ThreatWise cyber deception technology. Get started NOW on proactively defending your data. <\/p>\n\n\n\n

    \n
    \n
    \"\"<\/figure><\/div><\/div>\n\n\n\n
    \n

    Rise in Managed Services Provider Spending <\/strong><\/strong>
    – Donna Namorato<\/strong><\/strong><\/h4>\n<\/div>\n<\/div>\n\n\n\n

    The Institute of International Finance is predicting a global economic growth rate of just 1.2% in 2023, a level on par with 2009 when the world was only beginning its emergence from the from the financial crisis.1<\/sup> Even with economic uncertainty looming, expect that cybersecurity spending will continue to rise but don\u2019t be surprised if there is a decline in product and service spending.<\/p>\n\n\n\n

    And even while cybersecurity spending increases, according to a Jefferies CIO survey, 53% noted they would cut ITSM spending. If this happens, I would expect to see a rise in spending on Managed Service Providers (MSP). MSPs specialize in specific IT segments and can offer expert IT experience as they attract and retain talent, whereas organizations have difficulty doing so.<\/p>\n\n\n\n

    To remain vigilant against ransomware and data security, organizations must adopt a\u00a0ransomware strategy\u00a0and develop an\u00a0incident response plan<\/a>\u00a0against bad actors. Incorporating a\u00a0multilayered security framework\u00a0is also vital to safeguard your data and reduce cybersecurity risk. And, when you need help,\u00a0Commvault Ransomware Readiness Solutions<\/a>\u00a0is available to assist you.<\/p>\n\n\n\n

    \n
    \n
    \"\"<\/figure><\/div><\/div>\n\n\n\n
    \n

    Industry and Platform Consolidation <\/strong>
    – Brian Brockway, Global Chief Technology Officer<\/strong><\/h4>\n<\/div>\n<\/div>\n\n\n\n


    Currently, the security space is very convoluted. There are so many tools out there and lots of businesses have multiple solutions to make sure that they are fully protected. However, we have seen the industry start to consolidate and this should continue into 2023. All of the components need to work together in order to operate at maximum efficiency and stand the best chance of being protected. Consolidating them into one platform will be essential to ensure that you are getting the best out of your solutions and having a single pane of glass is key to managing them. Especially as costs continue to rise, organizations must ensure that they are spending every penny wisely and getting optimal output from every purchase.

    Yet, due to the sheer amount of threats facing businesses, there is also a growing understanding that not everything can be stopped, no matter how great your solutions are or how effectively you manage them. Organizations should turn their focus to resilience. It is almost inevitable now that businesses will be attacked at some point, but what really counts is how quickly you can recover from it. Regular backups should be taking place so that, even if the worst does happen, downtime is kept to a minimum and normal business operations can be restored as quickly as possible with little lasting damage.<\/p>\n\n\n\n

    \n
    \n
    \"\"<\/figure><\/div><\/div>\n\n\n\n
    \n

    \u201cInside-out\u201d CyberSecurity, Tiger Teams and Managed Services <\/strong>
    – Zack Brigman, Sr Product Marketing Manager<\/strong><\/h4>\n<\/div>\n<\/div>\n\n\n\n

    Cyberthreats continue to reach record highs, both in the number of successful breaches, as well as the damage incurred as a result of these attacks. As we look ahead to 2023, experts project these trends to continue to move in the wrong direction as adversaries employ new sophisticated tactics, hackers-for-hire networks continue to expand, and the security\/IT skills gap widens. And while these negative forces present difficult challenges to navigate, organizations will take a big leap in the coming year to better plan, invest, and mature their cybersecurity disciplines.<\/p>\n\n\n\n

    Prioritization<\/strong><\/p>\n\n\n\n

    Breaches happen. But not all assets, systems, and data are created equal. Given that a small percentage of information assets carry the majority of business risk, progressive companies will begin employing an \u201cinside-out\u201d cybersecurity strategy. One that starts with hardening and securing their most critical assets first \u2013 then working toward the perimeter. While perimeter defences and preventing intrusion will (and should) remain a paramount focus, this risk-aligned approach enables the prioritization of defence strategies to mitigate risk for high-value assets and functions. This reshapes conventional \u201coutside-in\u201d approaches, making security investments more accessible and operational.<\/p>\n\n\n\n

    Tiger Teams<\/strong><\/p>\n\n\n\n

    To better manage emerging threats and respond to risk, we will continue to see a rise in fusion teams (thanks Gartner for the term!) \u2013 merging IT, security, and operational stakeholders together to drive change. These blended teams help create new synergies by pairing complementary (but often siloed) groups and capacities to achieve common goals. These cross-functional teams increase visibility across the organization, discover and eliminate blind spots, and optimize investments in existing and new tools. While many mature organizations already leverage fusion teams today, 2023 will see a more widespread adoption of these functions to better identify risks, implement cyber response strategies, and manage threats.<\/p>\n\n\n\n

    Managed Services<\/strong><\/p>\n\n\n\n

    As threats mount, businesses will continue to adopt managed service (MSP) and managed security service (MSSP) offerings to augment existing tools and tactics. This is particularly true of lean IT departments and those looking to enhance their security operations centers. Leveraging these managed providers will enable organizations to close the cyber security skills gap, tap into a consortium of specialized solutions, and scale their cyber practice without managing additional headcount or disparate solutions. <\/p>\n\n\n\n

    Thanks to all our contributors! Stay tuned to see if their predictions come true by following Commvault and our DPaaS portfolio Metallic on Social Media. <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

    Cybersecurity experienced a huge year in 2022. So what can we expect in 2023? Check out what our Commvault professionals have to say.<\/p>\n","protected":false},"author":85,"featured_media":68631,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[975],"tags":[],"cmv_author":[855],"class_list":{"0":"post-68619","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity","8":"cmv_author-commvault","9":"entry"},"yoast_head":"\nCommvault\u2019s 2023 Cyber Security Predictions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Commvault\u2019s 2023 Cyber Security Predictions\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity experienced a huge year in 2022. So what can we expect in 2023? Check out what our Commvault professionals have to say.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-11T20:17:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T22:36:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"957\" \/>\n\t<meta property=\"og:image:height\" content=\"548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dpauciullo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dpauciullo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Commvault\u2019s 2023 Cyber Security Predictions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","og_locale":"en_US","og_type":"article","og_title":"Commvault\u2019s 2023 Cyber Security Predictions","og_description":"Cybersecurity experienced a huge year in 2022. So what can we expect in 2023? Check out what our Commvault professionals have to say.","og_url":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2023-01-11T20:17:41+00:00","article_modified_time":"2024-02-27T22:36:35+00:00","og_image":[{"width":957,"height":548,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","type":"image\/jpeg"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"Commvault\u2019s 2023 Cyber Security Predictions","datePublished":"2023-01-11T20:17:41+00:00","dateModified":"2024-02-27T22:36:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions"},"wordCount":1264,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","url":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","name":"Commvault\u2019s 2023 Cyber Security Predictions","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","datePublished":"2023-01-11T20:17:41+00:00","dateModified":"2024-02-27T22:36:35+00:00","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","width":957,"height":548},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Commvault\u2019s 2023 Cyber Security Predictions"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/68619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=68619"}],"version-history":[{"count":16,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/68619\/revisions"}],"predecessor-version":[{"id":513678,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/68619\/revisions\/513678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/68631"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=68619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=68619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=68619"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=68619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}