BitDepthFeatured

Cyberedge reports on cybersecurity trends

3 Mins read
  • The Cyberedge Group’s report aggregates the security profile of companies and their response to cybersecurity threats
  • Only 54.3% of organizations that paid ransoms successfully recovered their data, down from 72.7% two years ago
  • Attack Surface Management is a rapidly growing field within cybersecurity

Illustration by ArtemisDiana/DepositPhotos

BitDepth 1545 for January 12, 2026

The Cyberedge Group’s cybersecurity report maps an aspect of the sector that isn’t widely reported, the security profile of companies and how they are responding to cybersecurity threats.

The report by the research firm has been produced since 2016 and the 2025 report gathers information from 1,200 responders across a profile of global companies ranging from “small” operations with 500-999 employees to monoliths with 25,000 or more.

The largest bloc of respondents were those companies with 5,000 – 9,000 employees and those with 1,000 – 4,999. Companies were included from 17 countries, though there are few specifics about the experience in Latin America and none for the Caribbean. The largest number of respondents were from US organisations.

Responses came from the education, finance, government, healthcare, manufacturing, retail and telecommunications/technology sectors.
The broad insights do offer value to regional cybersecurity professionals.

Organisations that have experienced at least one successful cyberattack and the number that suffered six or more, increased between the 2016 and 2021 reports.

Those numbers hit a plateau between 2021 and 2023, with 85 per cent experiencing one infiltration and 40 per cent dealing with six or more cyberattacks.

More than ten successful cyberattacks were experienced by 7.9 per cent of respondents.

The aggregate numbers of infiltration success have dropped by 3.5 per cent since 2024, and the report suggests that greater focus on cybersecurity, increased cooperation among stakeholders in the International Counter Ransomware Initiative as well as an increase in successful responses by law enforcement to ransomware attacks have contributed to that change.

The count of organisations reporting that they have paid ransomware groups has also dropped.

Some countries actively discourage ransomware payments, and the report cited the slogan attributed to Robert Goodloe Harper in the 1790’s, “Millions for defense, but not one cent for tribute.”

Specific factors leading to the decrease of ransomware payments include, “Increasing doubts about the inclination and even the ability of ransomware gangs to provide effective decryption tools, and to honor their promises not to reveal exfiltrated data (doubt that paying a ransom will produce any results).”

“The refusal of some cyber insurance companies to cover ransom payments (although the policies may still cover costs related to losses from ransomware attacks) [and] a growing number of laws prohibiting ransom payments to some classes of cybercriminals and groups associated with terrorist organizations, and governments strongly discouraging ransom payments to anyone.”

Only half (54.3 per cent) of the organisations that paid ransoms successfully recovered their data, down from 72.7 per cent just two years ago.

The average ransom payment has been rising and falling since 2022, when the mean was US$211,529, peaking in the third quarter of 2023 at US$850,700 then dropping to $553,959 in the fourth quarter of 2024.

Areas of vulnerability identified by the report are Internet of Things (IoT) deployments and mobile device vulnerabilities, specifically mobile devices used in companies, but cybersecurity for mobile devices has significantly lagged behind threat initiatives.

Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern, harvesting of personally identifiable information (PII), account takeovers and payment fraud.

“Attack surfaces are getting much larger because sensitive data that used to be stored in a few databases and file servers in corporate headquarters are now scattered across multiple SaaS applications, cloud platforms, hosted services, home offices, and remote devices,” the report notes.

“Some cybersecurity experts now suggest that organizations should think about having multiple attack surfaces with different characteristics, versus one extremely large one.”

“Enterprise attack surfaces are expanding and diversifying. One of the main reasons is that applications and data are now, to use a technical term, all over the place.”

Attack surface management is a growth industry for cybersecurity experts, so much so that ASM is now a new and valid acronym in those circles.

Contributing to cybersecurity consolidation is the surprising growth in acceptance of frameworks, standards and expected systems that were once seen as an annoyance championed by government agencies and industry standards bodies.

These controls were once recommended, but in the face of growing cybersecurity threats, have become mandatory in many jurisdictions.

The growing threat landscape has also forced these standards to become more complete, timely and agile systems to shape relevant cybersecurity responses. It doesn’t hurt that in cybersecurity insurance claims, compliance is a factor in any case brought for recompense.

Leading frameworks being used by respondents are those offered by the Cloud Security Alliance (Cloud Control Matrix) and the National Institute of Standards and Technology (NIST) cybersecurity framework.

Request the report here.

Cyberedge reports on cybersecurity trends

Cyberedge reports on cybersecurity trends

Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Read More
Samsung’s ZFlip 7 shows steady improvement

Samsung’s ZFlip 7 shows steady improvement

Being able to use a powerful wide-angle lens in what is essentially a next level selfie mode is a big step up for the phone's target market.
Read More
Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Cyberedge reports on cybersecurity trends Cyberedge reports on cybersecurity trends
Samsung’s ZFlip 7 shows steady improvement Samsung’s ZFlip 7 shows steady improvement
Digital New Year’s resolutions Digital New Year’s resolutions
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
Old Mac, new OS Old Mac, new OS
Regional cybersecurity faces fire Regional cybersecurity faces fire
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Regional cybersecurity faces fire

4 Mins read
Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
FeaturedNews Briefs

Venture Credit Union announces recovery from ransomware attack

2 Mins read
The Qilin ransomware group has become increasingly active in the Caribbean in 2025.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Share your perspective in the comments!x
()
x