www.trendmicro.com Open in urlscan Pro
23.205.250.17  Public Scan

Submitted URL: https://visit.trendmicro.com/dc/RF1CpfBxb6pa6V2-SEcUtw-8sCWgurBaRfEmz0Yo9yFCzZB8brpRyxJYZB4WZwoV9-omdm6ngmAKcmu_MPmYPBr_rPWNG...
Effective URL: https://www.trendmicro.com/explore/en_gb_cybersecurity_focus/01590-tm1-en-wp?utm_source=mkto&utm_medium=email&utm_campaign=...
Submission: On September 30 via manual from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Thumbnails Document Outline Attachments Layers

Current Outline Item


Previous

Next
Highlight All Match Case
Match Diacritics Whole Words

Color
Size
Color
Thickness
Opacity
Presentation Mode Open Print Download Current View

Go to First Page Go to Last Page

Rotate Clockwise Rotate Counterclockwise

Text Selection Tool Hand Tool

Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling

No Spreads Odd Spreads Even Spreads

Document Properties…
Toggle Sidebar

Find
Previous

Next
of 6
Presentation Mode Open Print Download Current View

FreeText Annotation Ink Annotation

Tools
Zoom Out

Zoom In
Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300%
400%

EVERYTHING
IS CONNECTED:
Uncovering the ransomware
threat from global supply chains
A global study

Introduction
Over the past two years, cyber has come to dominate boardroom risk calculations.
That makes ransomware
unquestionably the pre-eminent concern of IT and business leaders. A vast
majority (87%) now view cyber
compromise as a bigger threat than an economic downturn, with a fifth admitting
that a serious attack in the
past nearly sent their business into bankruptcy.
Their concerns are well founded. One analysis reveals a 105% surge in ransomware
last year, with hundreds
of millions of attacks detected. That’s due in no small part to a surge in
threats during the pandemic, which
capitalised on digital investments and home working. Yet that’s only part of the
story.
The corporate attack surface is also increasingly distributed – across an
extensive supply chain that spans cloud
and software providers, professional services firms and other connected
entities. Each one of these may have
privileged network access or store sensitive information belonging to client
organisations. Each one therefore
represents a potential security risk which must be addressed. Yet too often
supply chains are nebulous and ill-
defined, with controls applied in a reactive and haphazard manner, if at all.
This must change.
To find out more, Trend Micro commissioned Sapio Research to interview 2958 IT
Decision Makers across
26 countries: UK, Belgium, Czech Republic, Netherlands, Spain, Sweden, Norway,
Finland, Denmark, France,
Germany, Switzerland, Austria, USA, Italy, Canada, Taiwan, Japan, Australia,
India, Poland, Hong Kong, Mexico,
Colombia, Chile, Brazil.
2,958IT security decision makers
26countries






More Information Less Information
Close

Enter the password to open this PDF file.

Cancel OK
File name:

-

File size:

-


Title:

-

Author:

-

Subject:

-

Keywords:

-

Creation Date:

-

Modification Date:

-

Creator:

-


PDF Producer:

-

PDF Version:

-

Page Count:

-

Page Size:

-


Fast Web View:

-

Close
Preparing document for printing…
0%
Cancel

LinkedIn LinkTwitter LinkFacebook LinkEmail Link
Contact us

2022 Midyear Cybersecurity Report - Defending the Expanding Attack Surfacepdf

Uncovering the ransomware threat from global supply chainspdf

Cyber Risk Index (2H’ 2021): An Assessment for Security Leaderswebpage

Are supply chain gaps exposing you to risk?webpage

How to better manage cyber riskpdf

Assessing Cyber Risk, part 1video

Assessing Cyber Risk, part 2video

Unified Cybersecurity Platform: Why CISOs are Shiftingwebpage

Transforming security for Carey Grouppdf