Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Identity: the new perimeter of ransomware defence | Computer Weekly

By Computer Weekly by By Computer Weekly
January 5, 2026
Home Uncategorized
Share on FacebookShare on Twitter


Ransomware has evolved from being an operational nuisance confined to the IT department into one of the most significant strategic risks faced by organisations today. Last year’s disruptive campaigns run by groups such as UNC3944, also known as Scattered Spider, highlight how these attacks have moved beyond technical exploitation, now centring on social engineering and identity abuse. These developments should be a wake-up call for boards of directors. Identity has become the new security perimeter, and the board’s role in safeguarding it has never been more important.

The changing face of ransomware

Incidents linked to the hacking group, Scattered Spider, have spread rapidly across multiple sectors, from retail in the United Kingdom to insurance and aviation companies in the United States. Their campaigns have created widespread outages, loss of customer data and lasting reputational damage. More significantly, these operations reveal how adversaries are bypassing traditional technical defences altogether.

One of the group’s most effective methods is voice phishing. By impersonating employees, attackers persuade help desk staff to reset credentials or adjust multifactor authentication settings. This gives criminals the ability to register their own devices for authentication, effectively handing them legitimate access to corporate systems. This tactic undermines the assumption that multifactor authentication alone provides a strong barrier. It also shows how vulnerable human processes can be when they fall outside the direct control of security teams.

Another shift is the targeting of modern IT infrastructure. As organisations pursue digital transformation and move workloads into the cloud, they create opportunities for attackers who can navigate between on-premises and cloud environments. Compromised accounts in single sign-on systems have allowed adversaries to extend their reach across a broad range of business applications. This approach transforms what once would have been a limited intrusion into a full-scale compromise of an enterprise environment.

At the heart of these campaigns lies the abuse of identity. Ransomware actors increasingly rely on valid credentials rather than custom malware or exploits. The implication is clear. Protecting identity is now the most important line of defence.

A strategic role for boards

Boards have a unique position in addressing this challenge. Identity security cannot be left solely to technical teams. It requires investment, cultural alignment and cross-organisational commitment, all of which fall within board-level oversight.

The most effective actions boards can take include:

  • Elevating identity to the same level of importance as traditional perimeter controls, with phishing-resistant authentication methods, stronger help desk verification, and regular employee awareness training.
  • Promoting a threat intelligence-led security posture by ensuring that security investments are closely tied to real-world adversary tactics and supported by resources such as hardening guides and red team exercises.
  • Embedding cyber risk oversight into digital transformation by demanding that security is built into innovation and cloud adoption from the outset, rather than treated as an afterthought.

Enabling trust and resilience

The future of business resilience rests on moving beyond reactive defence. Ransomware’s shifting tactics demonstrate that a purely technical response is insufficient. Directors must integrate cyber risk into their governance responsibilities. By doing so, they can ensure that security serves as the foundation for resilience, innovation and long-term growth.

Identity is no longer an issue confined to IT teams. It is the new centre of gravity in cybersecurity and therefore a strategic priority for the entire organisation. Boards that understand this shift and act decisively can protect their companies from the escalating threat of ransomware while also building the trust needed to thrive in a digital economy.

Jamie Collier is the Lead Threat Intelligence Advisor (Europe), Google Threat Intelligence Group.



Source link

By Computer Weekly

By Computer Weekly

Next Post
New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

Recommended.

[Webinar] Shadow AI Agents Multiply Fast —  Learn How to Detect and Control Them

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

September 9, 2025
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access

Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access

June 26, 2025

Trending.

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

November 19, 2025
Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

April 23, 2025
Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

May 5, 2025
Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

February 7, 2025
Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

May 8, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio