The Times Australia
News From Asia

.

Trend Micro Warns Devices and Accounts are Highest-Risk Assets

Cyber Risk Report highlights critical vulnerability, offers new ways to prioritize risk management

HONG KONG SAR - Media OutReach Newswire - 2 October 2024 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today urged network defenders to gain greater visibility into risk across their attack surface, after unveiling a new study* which provides granular metrics by region, company size, industry, asset type and more.

To read a full copy of the report, Intercepting Impact: 2024 Trend Micro Cyber Risk Report, please visit: https://www.trendmicro.com/vinfo/hk/security/news/cybercrime-and-digital-threats/intercepting-impact-2024-trend-micro-cyber-risk-report

Jon Clay, VP of threat intelligence at Trend Micro: "Trend's cyber risk report shares key insights on where risks are greatest within organizations such as weak security controls, misconfigurations, and unpatched actively exploited vulnerabilities. Shifting towards a more risk-based approach to cybersecurity—discovering the entire attack surface, using AI to calculate the actual risk, and providing mitigating controls advice—allows an organization to improve its cybersecurity posture like never before. This is a game changer for the industry."

Using a risk event catalog, the Trend Vision One™ platform calculates a risk score for each asset type and an index for organizations by multiplying an asset's attack, exposure, and security configuration by impact. An asset with low business impact and few privileges has a smaller attack surface, while higher-value assets with more privileges have a larger attack surface.

The following assets are the most at risk:

  • Devices: 22.6 million total devices, with 877,316 classified as high-risk.
  • Accounts: 53.9 million total accounts, with 12,346 classified as high-risk.
  • Cloud Assets: 14.5 million total cloud assets, with 9,944 classified as high-risk.
  • Internet-Facing Assets: 1.1 million total, with 1,661 classified as high-risk.
  • Applications: 8.8 million total applications, with 489 classified as high-risk.

The number of high-risk devices is much higher than that of accounts, even though there are more accounts in total. Devices have a larger attack surface—i.e., they can be targeted with more threats. However, accounts are still valuable as they can grant threat actors access to various resources.

Elsewhere, the report also found:

  • Americas has the highest average risk index among regions, with an average risk index rating of 43.4, driven by vulnerabilities in the banking sector and critical infrastructure and the region's attractiveness to profit-driven actors.
  • Europe is the quickest region to patch vulnerabilities, indicating strong security practices.
  • Mining has the highest risk score of any vertical due to its strategic position in global supply chains and large attack surface.
  • Pharmaceuticals are the fastest sector to patch vulnerabilities by several days, reflecting the importance of protecting sensitive data.
  • The top detected risk event is accessing cloud applications with a high risk level based on historical application data, known security features, and community knowledge.
  • Old and inactive accounts, accounts with disabled security controls, and sensitive data being sent outside the network are other risk events with high event counts.
The report also uncovered many weak configurations that could lead to compromise, especially around security control settings.

As the threat landscape continues to evolve, organizations' ability to identify and manage risks is becoming increasingly crucial. The Trend Vision One™ platform, with its integrated Attack Surface Risk Management (ASRM), provides the necessary tools for comprehensive threat visibility and effective risk mitigation.

The following steps are recommended to help mitigate cyber risk:

  1. Optimize product security settings to get alerts on misconfigurations.
  2. When a risky event is detected, contact the device and/or account owner to verify the event. Investigate the event using the Trend Vision One™Workbench search function to find more information about or check event details on the product management server.
  3. Disable risky accounts or reset them with a strong password and enable multi-factor authentication (MFA).
  4. Apply the latest patches or upgrade application and operation system versions regularly.

*The report is based on telemetry data from Trend Micro's Attack Surface Risk Management (ASRM) solution in its flagship cybersecurity platform, Trend Vision One™, plus the native eXtended Detection and Response (XDR) tools. It's divided into two sections: the user side covers risk in assets, processes, and vulnerabilities, while the adversary side maps adversary behaviors, MITRE, and TTPs. Data points are based on telemetry from December 25, 2023, to June 30, 2024.
Hashtag: #trendmicro #trendvisionone #visionone #cybersecurity #cyberrisk #cyberriskindex





The issuer is solely responsible for the content of this announcement.

Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's AI-powered cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend's platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to simplify and secure their connected world.

Times Magazine

DIY Is In: How Aussie Parents Are Redefining Birthday Parties

When planning his daughter’s birthday, Rich opted for a DIY approach, inspired by her love for drawing maps and giving clues. Their weekend tradition of hiding treats at home sparked the idea, and with a pirate ship playground already chosen as t...

When Touchscreens Turn Temperamental: What to Do Before You Panic

When your touchscreen starts acting up, ignoring taps, registering phantom touches, or freezing entirely, it can feel like your entire setup is falling apart. Before you rush to replace the device, it’s worth taking a deep breath and exploring what c...

Why Social Media Marketing Matters for Businesses in Australia

Today social media is a big part of daily life. All over Australia people use Facebook, Instagram, TikTok , LinkedIn and Twitter to stay connected, share updates and find new ideas. For businesses this means a great chance to reach new customers and...

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Times Features

How to Choose a Cosmetic Clinic That Aligns With Your Aesthetic Goals

Clinics that align with your goals prioritise subtlety, safety, and client input Strong results come from experience, not trends or treatment bundles A proper consultation fe...

7 Non-Invasive Options That Can Subtly Enhance Your Features

Non-invasive treatments can refresh your appearance with minimal downtime Options range from anti-wrinkle treatments to advanced skin therapies Many results appear gradually ...

What is creatine? What does the science say about its claims to build muscle and boost brain health?

If you’ve walked down the wellness aisle at your local supermarket recently, or scrolled the latest wellness trends on social media, you’ve likely heard about creatine. Creati...

Whole House Water Filters: Essential or Optional for Australian Homes?

Access to clean, safe water is something most Australians take for granted—but the reality can be more complex. Our country’s unique climate, frequent droughts, and occasional ...

How Businesses Turn Data into Actionable Insights

In today's digital landscape, businesses are drowning in data yet thirsting for meaningful direction. The challenge isn't collecting information—it's knowing how to turn data i...

Why Mobile Allied Therapy Services Are Essential in Post-Hospital Recovery

Mobile allied health services matter more than ever under recent NDIA travel funding cuts. A quiet but critical shift is unfolding in Australia’s healthcare landscape. Mobile all...