Security Gets Social: 10 of Dark Reading's Most Shared Stories
We scared up our most popular stories on Facebook, Twitter, and LinkedIn
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3689629e65a0a453/64f0d79c25b2c6531527b668/socialshare-intro.jpg?width=700&auto=webp&quality=80&disable=upscale)
When you want to spread interesting content around the Internet, where do you share? Based on our numbers, it looks like you're most active on LinkedIn - but Facebook is a close second. And if you don't use Google Plus, you're not alone. Not many people do.
We pulled data from the last three months to get a better sense of which Dark Reading stories are most frequently shared online and which social platforms are most commonly used among our readers. What we found were some exciting nuggets of data about how often stories are published, and an interesting throwback to news reports from this summer and fall.
Some of the most commonly shared articles related to topics keeping CISOs awake at night: malware-less attacks, the skills gap, insider threats, and data breaches. Some related to major cyberattacks from this year. One included parallels between cybersecurity and Game of Thrones.
Here, we share some of our social data with you. These ten articles were the most frequently shared on Facebook, Twitter, and LinkedIn during the months of August, September, and October 2017.
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.
7,556 total shares
More than 25% of organizations take at least six months to fill top cybersecurity positions, the ISACA reported earlier this year, and experts aren't very optimistic about the future. Much of the problem is, there aren't enough people with the right combination of skills to fight current threats. It doesn't help that the biggest security problems change day-by-day, creating a "moving target" businesses have trouble hitting.
The positions proving toughest to fill involve incident investigation and analysis. Automation can help prioritize incidents to fix, but technology can't replace the need for smart people to direct the automation and follow up on problems.
7,204 total shares
More than 10 million global data records are lost every day - and that's only from the data breaches that go public. About 1.9 billion records were exposed via data breaches during the first half of 2017, reports Gemalto's Breach Level Index, which did not include numbers from the Equifax data breach. Nearly 75% of breaches were caused by external attackers, and less than 20% were the result of internal inadvertent data loss.
5,350 total shares
Every type of security profession has a task they hate to face. Incident responders, for example, hate dealing with false positives. The average business sees nearly 2.7 billion events generated from various security tools each month. A Cloud Security Alliance (CSA) survey found more than 31% of respondents ignore alerts because they think so many of them are false positives. The story also dives into the most-hated security tasks among SOC analysts, security engineers, and penetration testers.
3,617 total shares
Businesses are getting hit with ransomware nearly as often as consumers, Symantec found in its Internet Security Report. Malicious malware can do far greater damage speeding through a corporate network than it can on a consumer's home device.
Ransomware attacks WannaCry and NotPetya helped drive businesses to account for 42% of all ransomware incidents in the first half of 2017. However, even without the data from those two incidents, overall numbers are on the rise.
3,607 total shares
Hackers capitalizing on the growth of mobile banking drove cyberattacks on Android devices up 40% year-over-year in the second quarter of 2017. Android attacks grew to 1.7 million per month, up from 1.2 million each month during that time frame. The most popular forms of security threats included rooters, at 22.8% of mobile attacks, downloaders (22.8%), and fake apps (7%).
3,390 total shares
The National Institute of Standards and Technology (NIST) released a finalized draft version of its cybersecurity lexicon framework, making it easier for employers and recruiters to explain the type of security experts they want to hire. The goal is to give businesses a common vocabulary to describe roles, specialties, knowledge, skills, and abilities. In addition to simplifying the hiring process, the framework could also give some much-needed guidance when creating curriculum or training programs.
3,323 total shares
Employees who transition into new roles often take corporate data with them, putting their former employers at risk for data breaches. Most businesses aren't doing enough to deprovision, or terminate, staff login information in-house: nearly half know of former employees who can still access enterprise applications after they leave. Twenty percent say failure to terminate employee access has led to a data breach.
3,015 total shares
Nobody reacted well when Equifax, in the aftermath of a massive data breach, required customers to waive their right to legal action against the company in exchange for free credit monitoring. Consumer advocacy groups including Public Citizen, Consumer Financial Protection Bureau, and NY Attorney General Eric Schneiderman demanded Equifax remove the forced arbitration clause. The company eventually removed the clause from its Terms of Use.
2,751 total shares
One-third of businesses are affected by malware-less threats, the SANS Institute reported, citing a new survey on the threat landscape. These types of attacks are harder to detect and fix because they aren't picked up by traditional signature-based technologies, ramping up the workloads for IT staff.
2,751 total shares
One-third of businesses are affected by malware-less threats, the SANS Institute reported, citing a new survey on the threat landscape. These types of attacks are harder to detect and fix because they aren't picked up by traditional signature-based technologies, ramping up the workloads for IT staff.
When you want to spread interesting content around the Internet, where do you share? Based on our numbers, it looks like you're most active on LinkedIn - but Facebook is a close second. And if you don't use Google Plus, you're not alone. Not many people do.
We pulled data from the last three months to get a better sense of which Dark Reading stories are most frequently shared online and which social platforms are most commonly used among our readers. What we found were some exciting nuggets of data about how often stories are published, and an interesting throwback to news reports from this summer and fall.
Some of the most commonly shared articles related to topics keeping CISOs awake at night: malware-less attacks, the skills gap, insider threats, and data breaches. Some related to major cyberattacks from this year. One included parallels between cybersecurity and Game of Thrones.
Here, we share some of our social data with you. These ten articles were the most frequently shared on Facebook, Twitter, and LinkedIn during the months of August, September, and October 2017.
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024