Perimeter

12/12/2014
09:22 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cyberattacks Longer, More Continuous Than Before

A surprisingly large number of organizations experienced cyberattacks lasting more than one month, a new survey found.

Companies hit with cyberattacks this year spent a longer time on average mitigating the threat than at any time previously, highlighting the growing sophistication and complexity of the threat landscape.

Some 19% of 340 technology executives surveyed by security vendor Radware Inc. earlier this year described attacks against their companies as “constant,” with about 15% saying the attacks lasted more than one month.

This marks the first time in the four years that Radware has done the survey where so many respondents reported experiencing month-long attacks. “This trend challenges the traditional concept of incident response, which assumes a normal state without attacks,” Radware said in its “Global Application & Network Security Report.”

Enterprises appeared more or less equally worried about a wide range of security threats, including phishing, fraud, IP theft, and worm and virus damage. Somewhat surprisingly though, distributed denial of service attacks (DDoS) topped the list of threats that IT managers were most concerned about this year, followed by advanced persistent threats, according to the Radware survey.

Concerns about the ability of companies to defend against cyberthreats are running high as the result of a seemingly never-ending string of high-profile data breaches this year.

The massive -- and still unfolding -- intrusion at Sony Pictures has capped what has been one of the worst-ever years for data breaches in recent memory. Since the breach at Target last year that exposed data on some 40 million credit and debit cards, others that have disclosed major network compromises include Home Depot, JPMorgan Chase, Supervalu, UPS Stores Inc., and Dairy Queen. In almost all these incidents, the intruders managed to remain undetected for weeks, and sometimes even months after gaining initial access into company networks.

“2014 was a watershed year for the security industry,” Radware noted. “Cyber-attacks reached a tipping point in terms of quantity, length, complexity and targets.”

Radware’s survey and those by others in recent weeks show that companies have become more aware of the risks they face and are moving to address them. Even so, some troubling gaps remain.

Radware, for instance, found that less than half the companies surveyed were equipped to fight off cyberattacks for any sustained period of time. In fact, 52% said they would be able to fight off a sustained attack on their network for a day at most. Nearly 50% of those surveyed identified reputation loss as their biggest concern, followed by revenue loss, and then service disruptions.

Another survey conducted by the Ponemon Institute on behalf of Experian showed that, while many companies have made some positive changes on the security front, their governance and overall data-breach preparedness continue to lag. Companies continued to have trouble in areas like data-breach response, risk assessments, network anomaly detection, and continuous network monitoring.

For instance, about 73% of the 567 IT executives surveyed by Ponemon said their companies had implemented a data-breach response plan. However, only about 30% felt the plan was “effective” or “very effective” while 30% felt exactly the opposite way.

Among the issues identified as hindering their breach response were a lack of visibility into end-user access to critical data and systems, the continuing proliferation of mobile devices and cloud services, and third-party access to corporate data.

Somewhat encouragingly, though, companies appear to be willing to invest more in shoring up security. The Radware survey showed that, while many companies still have a hard time figuring out how much they need to spend on security, nearly half said they had invested in new or specialized technologies to deal with cyberthreats. At many companies, security has become a CEO and board-level issue.

“Research confirms that the motives, means and effectiveness of security attacks are on the rise,” Radware said in its report. “[The trend] highlights the need for greater agility to quickly adapt to evolving threats.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mwallsedgewave
50%
50%
mwallsedgewave,
User Rank: Author
1/7/2015 | 4:50:53 PM
Good Points!
Good material!
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/15/2014 | 12:37:19 AM
CISO research by Ponemon
It's also worth pointing out that other research by Ponemon the past couple of years has indicated that getting a CISO immedaitely involved to deal with the fallout of a breach can significantly reduce the ultimate financial cost of the breach.
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19279
PUBLISHED: 2018-11-14
PRIMX ZoneCentral before 6.1.2236 on Windows sometimes leaks the plaintext of NTFS files. On non-SSD devices, this is limited to a 5-second window and file sizes less than 600 bytes. The effect on SSD devices may be greater.
CVE-2018-19280
PUBLISHED: 2018-11-14
Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro.
CVE-2018-19281
PUBLISHED: 2018-11-14
Centreon 3.4.x allows SNMP trap SQL Injection.
CVE-2018-17960
PUBLISHED: 2018-11-14
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
CVE-2018-19278
PUBLISHED: 2018-11-14
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed lengt...