News
3/18/2014
12:49 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Many Organizations Don't Go Public With Data Breaches Or Share Intel

Some 60 percent of organizations worldwide have an incident response team and plan in place to prepare for an attack, new report finds

There are likely many more breached retailers than Target, Neiman Marcus, Michaels, and Sally Beauty either unaware that they have been hit or not yet ready to go public. There also are many data breaches, even at retailers, that may never see the light of day: As a matter of fact, some 57 percent of organizations worldwide say they do not voluntarily report hacks that aren't bound by disclosure laws.

So says a new report published today by Arbor Networks and The Economist Intelligence Unit, which surveyed some 360 C-level or board-level business executives around the globe on their incident response posture. Some 77 percent of the respondents say their firms had been hit with a cyberattack in the past two years, but only about 35 percent say they share attack and threat information with other organizations in their industry, 32 percent say they do not share such intelligence, and 27 percent did not say one way or the other.

"Only a third of companies are willing to share information about incidents with other organizations ... But these days, the only way to defend is sharing," says Dan Holden, director of Arbor's ASERT.

Threat and attack intelligence-sharing is widely considered crucial to fight the bad guys and to give organizations information to prepare or defend against attack campaigns.

The U.S. is more active in intel-sharing than other nations, according to the report, with financial services, critical infrastructure and higher education as some of the most active in this practice. "Sharing information is one of the strengths of information security in the higher education industry, and we use multiple methods to share information and collaborate," says Brad Judy, director of information systems security at the University of Colorado, who was interviewed for the report.

[Breaches at Target and other retailers sound the alarm for retail industry to establish a cyber-threat Information-Sharing and Analysis Center. See Retail Industry Mulls Forming Its Own ISAC For Intel-Sharing .

Meanwhile, security incidents are becoming more common and frequent. While more than three-fourths say they have suffered an incident in the past two years, not all were not outsider-related: nearly 30 percent suffered major system outages and 27 percent, exposure of sensitive data by an employee.

Some 60 percent of organizations now have an incident response team and plan in place to prepare for an attack, with that rate on the rise, the report says. Some 80 percent of large organizations, and 70 percent of respondents overall, have third-party relationships in place with IR specialists. Those organizations hit with an attack in the past two years were more than twice as likely to have partnered with an IR specialist firm.

Execs see a well-orchestrated response to a security incident as a potential reputation-booster, the report found. Two-thirds of the respondents say that responding well to an incident can "enhance" the company's public reputation. "For Target, that's a big deal," Holden says, noting that the retailer suffered more customer fallout than TJX did. "Employee and customer awareness is different here [with Target] ... the saving face piece is big" today, he says.

The report also found that few execs are confident that their organization is prepared in the face of a security incident: Only 17 percent say they are fully prepared, and more than 40 percent say they would be better prepared if they had more knowledge about the threats out there. About half say they cannot predict how a breach would affect their business.

The execs surveyed for the report were spread across North America (31 percent), Europe (36 percent), and Asia-Pacific (29 percent).

The "Cyber incident response: Are business leaders ready?" report is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?