The Clusit Report 2024 is an important annual publication that provides a detailed overview of the main cyber attack trends and the state of cybersecurity at global and Italian level. The report of the first half of 2024 shows a significant increase in cyber attacks and an escalation in their complexity and dangerousness. Below, an in-depth analysis of the main findings that emerged.
Rise of global cyber attacks
In the first half of 2024, the number of global cyber attacks increased by phone number library compared to the previous half-year, with an average of nine serious attacks per day. This increase highlights how cybersecurity is increasingly under pressure, with attacks affecting important sectors and causing significant economic and reputational damage. Global cyber attacks pose a serious threat to digital infrastructure.
Cybersecurity in Italy: Sectors at Risk
In Italy, 7.6% of global attacks affected strategic sectors such as healthcare and manufacturing , with the former recording an 83% increase compared to 2023. This trend is particularly worrying because it affects areas that deal with sensitive data and critical infrastructure. Corporate cybersecurity is now an absolute priority to protect both the privacy of individuals and the operational continuity of manufacturing industries, essential for the stability of the national economy.
Evolution of attack techniques
The Clusit Report highlights that malware remains the most used attack technique , representing 34% of global incidents. In Italy, malware is responsible for 51% of attacks, with ransomware at the top of the threat list. Attack techniques are constantly evolving, favoring phishing , identity theft and the exploitation of software vulnerabilities. The integration of Artificial Intelligence has also made attacks even more sophisticated, increasing the risks for companies’ cybersecurity .
The role of NIS2 and new regulations
An important point of the Clusit 2024 Report concerns the implementation of the European Directive NIS2 , which promotes greater governance of cybersecurity within companies . The regulation requires companies to adopt a strategic approach to security, involving not only IT but also top management. The NIS2 Directive establishes a regulatory framework that obliges companies to follow rigorous standards and continuous training, demonstrating how cybersecurity is a shared responsibility.
Cyber Resilience and Quantum Computing: The New Challenges
is your organization ready for google’s generative search experience? The adoption of quantum computers represents a future challenge for cybersecurity. These devices can violate current encryption techniques, putting current defenses at risk and requiring new protection strategies. Cyber resilience, or the ability of an organization to resist and recover from attacks, therefore becomes essential to respond to increasingly complex and sophisticated threats.
Training and Awareness: The Pillars of Corporate Cyber Security
The Clusit Report emphasizes the importance of training and awareness to counter cyber attacks, considering the human factor as the primary cause of risk. In Italy , in fact, low digital culture makes companies vulnerable. To respond to this criticality, it is essential to promote a culture of cyber security at all company levels, raising awareness among both operational personnel and decision-making figures.
A Multidisciplinary Approach to Cybersecurity
The escalation of cyber attacks requires anhui mobile phone number list companies to take a multidisciplinary approach to cyber security . Solutions such as adopting a Zero Trust architecture , regular data backups and constant threat monitoring are just some of the best practices suggested. Added to these is a continuous investment in training and regulatory updates , which is essential to building a secure and resilient environment.
The Clusit 2024 Report therefore provides not only alarming data, but also concrete recommendations to address the challenges of corporate cybersecurity and respond effectively to a constantly evolving threat landscape.