Partner Perspectives //

bitdefender

2/28/2017
03:00 PM
Razvan Muresan
Razvan Muresan
Partner Perspectives
100%
0%

Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses

A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.

Only 64% of cyber attacks can be stopped, detected or prevented with the current resources, on average, according to a Bitdefender survey  of 250 IT decision makers at companies in the US with more than 1,000 PCs.

Bitdefender’s survey shows that 64% of IT decision makers think their IT security budget is sufficient, 2% say the budget is enough, but they are understaffed, and 7% percent say funding is sufficient but can’t accommodate future expansion. Only 3% of IT decision makers surveyed said the security budget in their company is insufficient.

Less than 20% of IT decision makers say they could stop more than 90% of cyberattacks, while another 20% say they could detect and prevent less than a quarter.

Image Source: Bitdefender
Image Source: Bitdefender

Bitdefender’s survey shows 34% of respondent companies were breached in the past 12 months, with 74% reporting they don’t know how their company was breached. As a result, some 73% of IT decision makers fear a breach would force their companies to pay financial compensation, while 66% fear losing their jobs.

Cloud Spending Up

Cloud security spending at 48% of respondent companies increased in the past year while spending for other security activities remained the same, Bitdefender’s survey shows. While almost two-thirds of IT decision makers say their security budget is sufficient, the rest would need an increase of 34% percent, on average, to deliver efficient IT security policies. This is mainly because migrating information from traditional data centers to a cloud infrastructure has significantly increased companies’ attackable surface, bringing new threats and more worries to CIO offices about the safety of their data.

For example, cybercriminals can spend large amounts of time inside organizations without being detected. Advanced persistent threats, or APTs, for instance, are often defined as threats designed to evade detection. In the virtualization paradigm, since nothing being executed in raw memory is encrypted – just scrambled – APTs that try to execute malicious code on a virtual machine can be intercepted by Bitdefender’s Hypervisor Introspection technology long before they actually compromise the operating system. In fact, as soon as the malicious code -  even delivered via a zero-day exploit -  tries to execute in the VM’s memory, the introspection engine will immediately “see” the malicious action and the code that was trying to execute.

This survey was conducted in October 2016 by iSense Solutions for Bitdefender on 250 IT security purchase professionals (CIOs/CEOs/ CISOs, 26%; IT managers/directors, 56%;  IT system administrators, 10%; IT support specialists, 5%) and othersfrom enterprises with 1,000+ PCs based in the United States.

Razvan, a security specialist at Bitdefender, is passionate about supporting SMEs in building communities and exchanging knowledge on entrepreneurship. A former business journalist, he enjoys taking innovative approaches to hot topics and believes that the massive amount of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
macker490
50%
50%
macker490,
User Rank: Ninja
3/1/2017 | 6:36:10 AM
"Hope is not a method"
between the cubes today employees are admonished to read incomming e/mails carefully and not to click on "anything funny"

there was an article on this this morning   on ComputerWorld

see A better security strategy than 'know your enemy': Know your co-workers

THINK

(1) are employees going to be highly successful in examining input mails for signs of fraud?    are they even capable of doing that ?   or are there going to be a few click-firsts and then ooooops errors ?

(2) why are your computer systems vulnerable to "phishing" messages that are loaded with malware?

---

a. start using PGP with Outlook to validate e/mails.   Or Thunderbird/ENIGMAIL .   It isn't hard; you can do it.

b. use a secure o/s.   we may not have any that are 100% secure -- but some are MUCH better than others.

 
Jet Hedon
50%
50%
Jet Hedon,
User Rank: Apprentice
3/1/2017 | 7:11:06 AM
Re: "Hope is not a method"
Thanks for your comment, helped me out to learn more
macker490
50%
50%
macker490,
User Rank: Ninja
3/1/2017 | 7:38:22 AM
1.2m phishings
according to an essay published this morning on Help Net Security:

With 1.2 million phishing attacks, 2016 was a success for cybercriminals

while converting to a more secure o/s may not be immediately practicle nonetheless people can move ahead with AUTHENTICATION for e/mail, current term

consider using Symantec/PGP Desktop with Outlook,   or -- use ENIGMAIL with Thunderbird

note that this can be phased in -- as users and correspondents can acquire training and software step-wise. 

while this will be seen as a burden cost the potential for blocking tragedy is significant.

all e/mail should be authenticated and encrypted.

Link to article
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-8298
PUBLISHED: 2018-09-24
Multiple SQL injection vulnerabilities in the login page in RXTEC RXAdmin UPDATE 06 / 2012 allow remote attackers to execute arbitrary SQL commands via the (1) loginpassword, (2) loginusername, (3) zusatzlicher, or (4) groupid parameter to index.htm, or the (5) rxtec cookie to index.htm.
CVE-2018-14825
PUBLISHED: 2018-09-24
A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable...
CVE-2018-17437
PUBLISHED: 2018-09-24
Memory leak in the H5O_dtype_decode_helper() function in H5Odtype.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
CVE-2018-17438
PUBLISHED: 2018-09-24
A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
CVE-2018-17439
PUBLISHED: 2018-09-24
An issue was discovered in the HDF HDF5 1.10.3 library. There is a stack-based buffer overflow in the function H5S_extent_get_dims() in H5S.c. Specifically, this issue occurs while converting an HDF5 file to a GIF file.