informa
1 MIN READ
Products & Releases

Five Things Every Organization Should Know about Detecting And Responding To Targeted Cyberattacks

Most companies continue to try to protect themselves using approaches that are years out of date, according to a new how-to book published by ISACA and written by Ernst & Young
Rolling Meadows, IL, USA (15 May 2013)--The advanced persistent threat (APT) is waging an all-out attack on enterprises' intellectual property. Yet most companies continue to try to protect themselves using approaches that are years out of date. That is one of the conclusions in Responding to Targeted Cyberattacks, a frank new how-to book published by global IT association ISACA and written by Ernst & Young LLP.

The threat landscape has progressed from unsophisticated "script kiddies" to hackers to insiders to today's state-sponsored attacks, where enterprises are attacked because of who they are, what they do and the value of their intellectual property (IP).

"There are no universal solutions to prevent being infiltrated," said James Holley, leader for Ernst & Young LLP's Information Security Incident Response services and co-author of the book. "If sophisticated and well-funded attackers target a specific environment, they will get in. In this rapidly evolving threat landscape, information security professionals need to adopt the mindset that their network is already compromised or soon will be."

In a detailed look at an escalating global problem, the authors highlight five things every organization should know:

Editors' Choice
Robert Lemos, Contributing Writer, Dark Reading
Robert Lemos, Contributing Writer, Dark Reading
Dark Reading Staff, Dark Reading
Jai Vijayan, Contributing Writer, Dark Reading