Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
10 Cybercrime Myths that Could Cost You Millions
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/4/2017 | 3:10:27 PM
Re: #4
@Marc: Gotcha.

23% of all respondents or 23% of those 40%?  Because you'd want to correlate that and know how that split works.
Marc Wilczek
50%
50%
Marc Wilczek,
User Rank: Author
5/3/2017 | 1:52:54 AM
Re: #4
@Joe: Just look at the stats of the Radware report: "mom-and-pop shops" don't represent 40% of the survey respondents. Only 23% of the respondents are from organizations with <100 employees.
faizmughal
50%
50%
faizmughal,
User Rank: Apprentice
5/2/2017 | 3:13:30 AM
Re: #4
nice
IDONTHAVEANICKNAME
50%
50%
IDONTHAVEANICKNAME,
User Rank: Apprentice
5/1/2017 | 1:21:13 PM
10 Cybercrime Myths that Could Cost You Millions
To which I could add an eleventh:

"I have'nt heard it from the BBC so it can't be an issue"

Yeah really....I did hear this from someone who shall remain nameless!

 

 

 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/1/2017 | 1:03:08 PM
Re: #4
@Marc: It's striking but I'm not sure how surprising it is, depending upon what the proportion of small, medium, and large businesses is and what the industry split is.  For a large healthcare or life-sciences organization to not have an incident-response plan is practically unheard of.  For a small mom-and-pop retailer to not have an incident response plan is not at all surprising (despite the wisdom of the decision).
Marc Wilczek
50%
50%
Marc Wilczek,
User Rank: Author
4/30/2017 | 1:43:26 AM
Re: #4
Your idea goes two steps further. What I find most striking about #4 is that "40% have no incident response plans" -- that's at least 'surprising' to put it mildly. Still far too many organizations are unprepared and hit by surprise, if an incident occurs.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/29/2017 | 6:31:06 PM
#4
Moreover, with all the debate about offensive cybersecurity -- i.e., "hacking back" -- as well as the legal uncertainties surrounding it, even some of the more security-conscious firms could feel stifled.


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18986
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users.
CVE-2019-18981
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 lacks an Access Denied outcome for a certain scenario of an incorrect recipient ID of a notification.
CVE-2019-18982
PUBLISHED: 2019-11-15
bundles/AdminBundle/Controller/Admin/EmailController.php in Pimcore before 6.3.0 allows script execution in the Email Log preview window because of the lack of a Content-Security-Policy header.
CVE-2019-18985
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 lacks brute force protection for the 2FA token.
CVE-2019-18928
PUBLISHED: 2019-11-15
Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.