Skip to main content

Cisco 2016 Annual Security Report Revealed



The Cisco 2016 Annual Security Report, which examines threat intelligence and cybersecurity trends, revealed that only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns.

While executives may be uncertain about their security strength, 92 percent of them agree that regulators and investors will expect companies to manage cybersecurity risk exposure. These leaders are increasing measures to secure their organizations’ future, particularly as they digitize their operations.

The report highlights the challenges businesses face due to the rapid advancements of attackers. Hackers increasingly tap into legitimate resources to launch effective campaigns for profit-gain. Additionally, direct attacks by cybercriminals, leveraging ransomware alone, put $34 million a year per campaign into their hands. These miscreants continue to operate unconstrained by regulatory barriers.

Businesses are up against security challenges that inhibit their ability to detect, mitigate and recover from common and professional cyberattacks. Aging infrastructure and outdated organizational structure and practices are putting them at risk.

The study sounds a global call-to-arms for greater collaboration and investment in the processes, technologies and people to protect against industrialized adversaries.

Top Research Findings

Decreasing confidence, increasing transparency: Less than half of businesses surveyed were confident in their ability to determine the scope of a network compromise and to remediate damage. But, an overwhelming majority of finance and line-of-business executives agreed that regulators and investors expect companies to provide greater transparency on future cybersecurity risk. This points to security as a growing boardroom concern.

Aging infrastructure: Between 2014 and 2015, the number of organizations that said their security infrastructure was up-to-date dropped by 10 percent. The survey discovered that 92 percent of Internet devices are running known vulnerabilities. Thirty-one percent of all devices analyzed are no longer supported or maintained by the vendor.

SMBs as a potential weak link: As more enterprises look closely at their supply chain and small business partnerships, they are finding that these organizations use fewer threat defense tools and processes. For example, from 2014 to 2015 the number of SMBs that used web security dropped more than 10 percent. This indicates potential risk to enterprises due to structural weaknesses.

Outsourcing on the rise: As part of a trend to address the talent shortage, enterprises of all sizes are realizing the value of outsourcing services to balance their security portfolios. This includes consulting, security auditing and incident response. SMBs, which often lack resources for an effective security posture, are improving their security approach, in part, by outsourcing, which is up to 23 percent in 2015 over 14 percent the previous year.

Shifting server activity: Online criminals have shifted to compromised servers, such as those for WordPress, to support their attacks, leveraging social media platforms for nefarious purposes. For example, the number of WordPress domains used by criminals grew 221 percent between February and October 2015.

Browser-based data leakage: While often viewed by security teams as a low-level threat, malicious browser extensions have been a potential source of major data leaks, affecting more than 85 percent of organizations. Adware, malvertising, and even common websites or obituary columns have led to breaches for those who do not regularly update their software.

The DNS blind spot: Nearly 92 percent of “known bad” malware was found to use DNS as a key capability. This is frequently a security “blind spot” as security teams and DNS experts typically work in different IT groups within a company and don’t interact frequently.

Time to detection faster: The industry estimate for time to detection of a cybercrime is an unacceptable 100 to 200 days. Cisco has further reduced this figure from 46 to 17.5 hours, since the 2015 Cisco Midyear Security Report was released. Shrinking the time to detection has been shown to minimize cyberattack damage, lowering risk and impact to customers and infrastructures worldwide.

Trust matters: With organizations increasingly adopting digitization strategies for their operations, the combined volume of data, devices, sensors, and services are creating new needs for transparency, trustworthiness, and accountability for customers




via ITnewsafrica

Comments

Popular posts from this blog

11 Habits You Need to Stop Doing

Stop watching too much TV If you spend too much time watching TV, you are wasting your life away. I feel really strongly about this one. I don’t have cable, and while I do watch some shows on Netflix, it’s few and far between. I only watch TV after I really am relaxed and need a break. I’m also careful not to turn on the TV right when I get home. I find that if I do this, I’m sucked in. This is why I keep my reading list and focus on reading good books instead. So, start to pay attention to how much TV you’re watching. If you think it’s too much, cut back. Limit your TV intake to 30 minutes to 1 hour per day, if possible. Stop talking about people behind their backs Talking about someone behind her back is a bad idea for a number of reasons. First, if someone is talking to you behind someone else’s back, you can bet on it that they also will talk about you. Second, did you know that when you talk about someone negatively, the person who you’re talking to will associate yo

John Deere Tractor for sale Asking price 850,000/-

The details are as follows: Make - John Deere (Original from Germany) Reg No: KTCB271G Model - 3130 Configuration: 2WD 97hp Color- Green & Yellow YOM: 1980 Fuel: Diesel Asking 850,000/- Asking price 850,000/- It has brand new front tyres and 70%(new) rear tyres. It is a very powerful Machine and it is an original John Deere in serviceable and working condition. The tractor can serve you in different fields like ploughing and transportation of things like sugarcane etc For more picture kindly check below If interested please give me a call on +254726687369 (Davis) The Tractor is currently stationed in Chemelil,Kisumu County

Boss Discovered My Side Job And Threatened To Fire Me!!

Here is Judy’s Story I have been working for my current boss for close to 3 years now. The job is okay, it’s just that my salary has not been increased during this whole time. I have been struggling to make ends meet and to be honest, I have been surviving on loans from here and there. A few months back, a friend of mine introduced me to a guy who offered me an online job and a salary that is equal to the one that my boss pays me. The job was so flexible, so I quickly agreed to do it. To juggle the two jobs, I have been getting to work very early and then I start with the workload for my ‘actual’ job and then when I am done, I tackle the other job which is so much more flexible and easier. I have really been enjoying this because every end of the month, I get not one, but two pay checks. I have found financial freedom that I never thought was possible. I can even afford to save cash for the future However, I am afraid I messed up and it may cost me my job. I got to work very