Perimeter

12/12/2014
09:22 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cyberattacks Longer, More Continuous Than Before

A surprisingly large number of organizations experienced cyberattacks lasting more than one month, a new survey found.

Companies hit with cyberattacks this year spent a longer time on average mitigating the threat than at any time previously, highlighting the growing sophistication and complexity of the threat landscape.

Some 19% of 340 technology executives surveyed by security vendor Radware Inc. earlier this year described attacks against their companies as “constant,” with about 15% saying the attacks lasted more than one month.

This marks the first time in the four years that Radware has done the survey where so many respondents reported experiencing month-long attacks. “This trend challenges the traditional concept of incident response, which assumes a normal state without attacks,” Radware said in its “Global Application & Network Security Report.”

Enterprises appeared more or less equally worried about a wide range of security threats, including phishing, fraud, IP theft, and worm and virus damage. Somewhat surprisingly though, distributed denial of service attacks (DDoS) topped the list of threats that IT managers were most concerned about this year, followed by advanced persistent threats, according to the Radware survey.

Concerns about the ability of companies to defend against cyberthreats are running high as the result of a seemingly never-ending string of high-profile data breaches this year.

The massive -- and still unfolding -- intrusion at Sony Pictures has capped what has been one of the worst-ever years for data breaches in recent memory. Since the breach at Target last year that exposed data on some 40 million credit and debit cards, others that have disclosed major network compromises include Home Depot, JPMorgan Chase, Supervalu, UPS Stores Inc., and Dairy Queen. In almost all these incidents, the intruders managed to remain undetected for weeks, and sometimes even months after gaining initial access into company networks.

“2014 was a watershed year for the security industry,” Radware noted. “Cyber-attacks reached a tipping point in terms of quantity, length, complexity and targets.”

Radware’s survey and those by others in recent weeks show that companies have become more aware of the risks they face and are moving to address them. Even so, some troubling gaps remain.

Radware, for instance, found that less than half the companies surveyed were equipped to fight off cyberattacks for any sustained period of time. In fact, 52% said they would be able to fight off a sustained attack on their network for a day at most. Nearly 50% of those surveyed identified reputation loss as their biggest concern, followed by revenue loss, and then service disruptions.

Another survey conducted by the Ponemon Institute on behalf of Experian showed that, while many companies have made some positive changes on the security front, their governance and overall data-breach preparedness continue to lag. Companies continued to have trouble in areas like data-breach response, risk assessments, network anomaly detection, and continuous network monitoring.

For instance, about 73% of the 567 IT executives surveyed by Ponemon said their companies had implemented a data-breach response plan. However, only about 30% felt the plan was “effective” or “very effective” while 30% felt exactly the opposite way.

Among the issues identified as hindering their breach response were a lack of visibility into end-user access to critical data and systems, the continuing proliferation of mobile devices and cloud services, and third-party access to corporate data.

Somewhat encouragingly, though, companies appear to be willing to invest more in shoring up security. The Radware survey showed that, while many companies still have a hard time figuring out how much they need to spend on security, nearly half said they had invested in new or specialized technologies to deal with cyberthreats. At many companies, security has become a CEO and board-level issue.

“Research confirms that the motives, means and effectiveness of security attacks are on the rise,” Radware said in its report. “[The trend] highlights the need for greater agility to quickly adapt to evolving threats.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mwallsedgewave
50%
50%
mwallsedgewave,
User Rank: Author
1/7/2015 | 4:50:53 PM
Good Points!
Good material!
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/15/2014 | 12:37:19 AM
CISO research by Ponemon
It's also worth pointing out that other research by Ponemon the past couple of years has indicated that getting a CISO immedaitely involved to deal with the fallout of a breach can significantly reduce the ultimate financial cost of the breach.
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12959
PUBLISHED: 2018-07-19
The approveAndCall function of a smart contract implementation for Aditus (ADI), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all contract balances into their account).
CVE-2018-14336
PUBLISHED: 2018-07-19
TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.
CVE-2018-10620
PUBLISHED: 2018-07-19
AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code t...
CVE-2018-14423
PUBLISHED: 2018-07-19
Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in lib/openjp3d/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
CVE-2018-3857
PUBLISHED: 2018-07-19
An exploitable heap overflow exists in the TIFF parsing functionality of Canvas Draw version 4.0.0. A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain...