"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of whatโs going on, which helps us to make changes and recommendations for future plans."
IT Service Manager
Ian Harkess
Trusted by industry leaders
Kickstart Your FastTrack Journey
Fill out the short form below to express your interest in our FastTrack programme, and weโll be in touch soon.
Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
โWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ
IT Operations Manager
Simon Darley
Trusted by industry leaders
Let's Talk
Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.
โWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ
Itโs no secret that data is becoming increasingly commoditised, and with stolen data on the dark web and selling for the highest price, hackers are benefitting more than ever.
โAttacks are inevitable, failure doesnโt have to beโ
This in-depth, 58-page report explores threat actorsโ exploitation of the after-effects of a global pandemic, and the turmoil caused by conflict between Russia and Ukraine, as IBM states, โcreating exactly the kind of chaos in which cybercriminals thrive. And thrive they did.โ.
Key findings include the usual suspects, such as phishing and ransomware, but interestingly, IBM found that backdoor deployments became the most common cyber attack on organisations in 2023.
Itโs no secret that data is becoming increasingly commoditised, and with stolen data on the dark web and selling for the highest price, hackers are benefitting more than ever.
This uptick in backdoor deployment (21% of incidents) even overtook levels of ransomware last year; however, itโs worth noting that ransomware still claimed 17% of incidents, and about 67% of those backdoors were failed ransomware attempts, where defenders disrupted the backdoor before ransomware was deployed.
Want to know more? Weโve summarised IBMโs key findings below.
IBM X FORCE INDEX FINDING: Top Attack Impact – Extortion
Extortion was the top impact from threat actors last year, claiming 27% of incidents. IBM predicts this trend will continue to grow as hackers evolve and adapt to organisations’ defences. Europe saw the highest amount of extortion cases last year, making up 44% of all extortion cases. The UK was the most targeted country within Europe, accounting for 43% of cases.
There was a slight decline in ransomware attacks last year; however, IBM discovered that the time to execute attacks has reduced by 94%, meaning that what once took hackers months now takes a couple of days. This new challenge highlights the importance of understanding how threat actors think and operate, as well as ensuring comprehensive defence systems are put in place.
IBM X FORCE INDEX FINDING: Phishing and Vulnerability Exploitation – The Top Initial Access Vectors in Attacks
Phishing is still the favoured infection vector for cybercriminals attempting to exploit organisations, identified in 41% of attacks. 62% of all phishing attacks last year used spear phishing attachments, deployed by themselves or via a service.
Since Microsoft announced its decision to block macros and improve security in Office, there has been a significant drop in infections by malicious macros. IBM states, โMalicious use of ISO and LNK files escalated as the primary tactic to deliver malware through spam in 2022โ.
Regarding vulnerabilities, cybercriminals already possess a multitude of them, and they don’t need to spend resources searching for new ones as many old common. Unfortunately, many common vulnerabilities still work just fine for themโฆ
In 2022, X-Force reported an 800% rise in infections caused by exploiting the WannaCry vulnerability from 2017. This underscores the significance of organisations refining their vulnerability management plans and prioritising critical patches.
IBM X FORCE INDEX FINDING: Cyber-Related Developments of Russiaโs First Year of War in Ukraine – Hacktivism & Wiper Attacks
Russiaโs invasion of Ukraine sparked industry-wide and governmental predictions of high-impact cyber operations in modern warfare โ the severity of these predictions has not fully materialised.
However, what the IBM report does highlight is Russiaโs deployment of a vast number of wipers against Ukrainian targets, and that hacktivism has seen a resurgence from groups attacking both sides.
Modern warfare no longer means isolated geographical combat, and this war has reignited international hacktivist threats โ spawning pro-Russian groups with global target lists โ and has reshaped the cybercrime landscape in Eastern Europe.
Notably, defenders are adapting quickly to these wiper attacks and identifying, analysing and publicising attacks to help prevent future victims. There were 8 identified wiper attacks last year, alongside the discovery and disruption of a planned Russian cyber attack on Ukraineโs electric grid in April 2022.
However, it’s not all doom and gloom; itโs worth noting that defenders are proficiently utilising the advancements in detection, response, and information sharing that have been established over the past few years. Several of the initial wiper attacks were promptly recognised, examined, and disseminated, aiding in shielding others from being targeted.
Recommendations from the X-Force Threat Intelligence Index
1. Manage your assets
The first step to securing your organisation against cyber threats is having a full understanding and overview of what data you have, what you are securing and what data is critical to your business. It is vital for organisations to include source code, credentials and any other data which is visible on the dark web in their asset management program.
2. Know your adversary
Understanding how threat actors operate, recognising their level of expertise and identifying known tactics, techniques and procedures will provide a holistic and thorough approach to securing your data. It is recommended to gain insight into the specific threat actors which are likely to target your industry, geography and your organisation.
3. Manage visibility
Once you have gained a comprehensive understanding of what data you are protecting and who could be trying to steal it, it’s important to have confident visibility of your enterprise. Meaning that cyber attacks can be detected and defended in a timely manner, to prevent disruptions on a much larger scale.
4. Challenge assumptions
Organisations should prioritise offensive testing and continuously assess their security through the eyes of a cybercriminal. To facilitate successful security systems, organisations must perform regular vulnerability assessments, penetration testing and red teaming to gain a full understanding of how a malicious actor could infiltrate and exploit their system.
5. Act on intelligence
Threat intelligence must be applied to every aspect of your organisation to stay one step ahead of adversaries. Applying threat intelligence to an understanding of who your attacker is and how they operate enables you to effectively secure your data, develop high-fidelity detection opportunities and defend against cyber threats.
6. Be prepared.
โAttacks are inevitable, failure doesnโt have to be. IBM emphasises the need for incident response plans, built specifically for each organisationโs environment. Maintaining security is essential and can be achieved through regular drills and modifications that aim to improve response, remediation, and recovery time.
Stripe OLT has achieved the Microsoft Cloud Security Specialisation, proving our expertise in securing Azure and Microsoft cloud environments. Learn what this means for your business.
Weโre incredibly proud to share that Stripe OLT has been named โSME Security Solution of the Yearโ at the 2025 Computing Security Excellence Awards.
Stripe OLT is now part of the Microsoft FastTrack Program, giving SMEs direct access to expert-led cloud adoption, security, and digital transformation - at no extra cost. Find out how this accelerates your IT resilience?
Donโt let cyber criminals turn your holiday deals into a data breach. Check out our bite-sized security guide to keep your users, and your business, safe this shopping season.
Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike. The issue appears to have impacted a large number of organisations - from banks to airlines. Here are the current advisories.
Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike. The issue appears to have impacted a large number of organisations - from banks to airlines. Here are the current advisories.
We're thrilled to share the news: Stripe OLT has been recognised as one of the top 50 emerging stars at the prestigious Megabuyte100 Awards 2024. These awards stand out in the UK's tech landscape, offering an unbiased, expert analysis of companies' financial prowess via the Megabuyte Scorecard.
A big congratulations to our Microsoft 365 guru, Lewis Barry, who received MVP status for his incredible work within the Microsoft technology community.
Last week, the 2023 Scale-Up Awards took place at Novotel London West, concluding months of nominations and judging for this yearsโ most successful entrepreneurs and scale-up organisations. Naturally, we were extremely happy to be in attendance, but it turned out to be a very successful night...
As you may have seen in the press earlier this year, Stripe OLT recently achieved two crucial Microsoft certifications, in both Modern Work and Security. As such, weโre very proud to announce our cyber security teamโs latest achievement - the Microsoft Security Threat Protection specialisation.
This website uses cookies. By using this site you agree to our use of cookies. We use cookies to enhance your experience. To understand the specific cookies we use and how we handle your data, see out Cookie Policy, Privacy Policy and Terms & Conditions. Manage your preferences at any time by clicking the 'View Preferences' button.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.