Five Things Every Organization Should Know about Detecting And Responding To Targeted Cyberattacks

Most companies continue to try to protect themselves using approaches that are years out of date, according to a new how-to book published by ISACA and written by Ernst & Young

May 16, 2013

1 Min Read

PRESS RELEASE

Rolling Meadows, IL, USA (15 May 2013)--The advanced persistent threat (APT) is waging an all-out attack on enterprises' intellectual property. Yet most companies continue to try to protect themselves using approaches that are years out of date. That is one of the conclusions in Responding to Targeted Cyberattacks, a frank new how-to book published by global IT association ISACA and written by Ernst & Young LLP.

The threat landscape has progressed from unsophisticated "script kiddies" to hackers to insiders to today's state-sponsored attacks, where enterprises are attacked because of who they are, what they do and the value of their intellectual property (IP).

"There are no universal solutions to prevent being infiltrated," said James Holley, leader for Ernst & Young LLP's Information Security Incident Response services and co-author of the book. "If sophisticated and well-funded attackers target a specific environment, they will get in. In this rapidly evolving threat landscape, information security professionals need to adopt the mindset that their network is already compromised or soon will be."

In a detailed look at an escalating global problem, the authors highlight five things every organization should know:

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights