CV_JanFeb_23

The internet is far deeper and more expansive than most people imagine. Most users browse the easily-accessible pages of the “surface web” – approximately 10 percent of internet space – while being completely oblivious of the “deep” and “dark” web where the majority of data lives. The terms “dark web” and “deep web” tend to be used interchangeably, however they are fundamentally different. While both are hidden from the public and inaccessible with standard search engines, the content on each varies considerably. According to a report by Dr. Gareth Owen from the University of Portsmouth, the majority of dark web content comprises illegal activity. In contrast, most deep web content is legal and hidden behind password-protected login forms, including online banking services, social media profile pages, streaming entertainment and webmail. Since the deep web is a repository of valuable financial, governmental and personal data, it is most often the target of organized crime, as much as an estimated at 80 percent, according to a recent Verizon report. As more businesses put their databases on the deep web, cybersecurity threats continue to grow. According to sources referenced in a recent Oxylabs threat intelligence report, 36 billion records were exposed via data breaches by the end of Q3 2020, while the global information security market was expected to reach $170.4 billion by 2022. In turn, the majority of enterprise executives planned to increase cybersecurity budgets. Besides compromising security and taking systems down, cybercrime directly cuts into business profitability. According to an IBM report, the average cost of a data breach is $3.92 million at $150 per record, with an average size of 25,575 records lost per incident. Numerous factors contribute to security vulnerabilities that lead to data breaches. According to IBM, the five most common include extensive cloud migration, thirdparty involvement, system complexity, compliance failures and issues with operational technology. Threat intelligence is critical to reversing this trend by helping organizations obtain data to use in security strategies. In addition to ensuring that adequate security Cyber threat intelligence is a vital strategy that prevents attacks, and web scraping is critical to its success CYBER PATROL THERE’S THE RUB By Andrius Palionis 28 CHANNELV ISION | JANUARY - FEBRUARY 2023

RkJQdWJsaXNoZXIy NTg4Njc=