One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1140184
Date de publication 2019-05-14 13:00:00 (vue: 2019-06-05 04:00:24)
Titre Confidence: the perception and reality of cybersecurity threats
Texte report on rsa survey At RSA 2019, we conducted a survey that netted 733 respondents along with interviews between Javvad Malik, former security advocate at AT&T Cybersecurity, and security experts. The full results are in his comprehensive and informative research report. Following are a few highlights: Internal threats internal threats graph Phishing is the clear “winner” here. At 29%, nearly a third cited phishing as the threat that worries them the most. Phishing comes in different guises for different purposes. Sometimes phishing emails are used to deliver a malicious payload. Other times it’s to social engineer the recipient by gaining their trust or scaring them by posing as an authority to get them to make payments—as we often see in business email compromise (BEC) attacks. Ultimately, this likely boils down to the fact that for most cyber threats, a technology solution is usually available to ward off attacks, but with phishing, most systems rely heavily on the email recipient being able to detect and respond appropriately. In second place comes ransomware, which has entered into the vocabulary of nearly everyone in the last few years. The biggest challenge with ransomware is that, unlike other attacks, there is no hiding from the fact that systems have been compromised; and even if recovery is quick and without any loss of data, the reputational damage can be detrimental. Social media threats showed up in third place, with 16% of participants citing it as a worry. This, perhaps surprisingly, is ahead of having a shortage of skilled staff. Delving into this, though, it makes perfect sense. Social media has rapidly become an unmanaged and uncharted source of risk for many companies. Any mistake can impact brand and trust, expose sensitive information, or indeed become a source of entry into an organization. External threats external threats When asked the same question about external threats, cloud security threats were cited as top worry in 27% of all responses. While it may feel as if discussions around cloud and cloud security have been ongoing for many years, it is still a relatively new area for many companies. The implications of moving to the cloud with or without a well-defined strategy are being felt today, and with so many data leaks attributed to misconfigured cloud databases, or through poor credential management, companies are right to be worried. Distributed denial of service (DDoS) attacks were in second place, closely followed by Internet of Things (IoT) attacks and nation states. The rest of the story The learn more details on the survey methodology, how well InfoSec pros and execs see eye-to-eye, results broken down by industry sector and company size, plus the conclusions we can draw, please read the research report. The whole report is available on our website, in the Resource Center.   
Envoyé Oui
Condensat 2019 733 able about advocate ahead all along any appropriately are area around asked at&t attacks attributed authority available bec become been being between biggest boils brand broken business but can center challenge cited citing clear closely cloud comes companies company comprehensive compromise compromised; conclusions conducted confidence: credential cyber cybersecurity damage data databases ddos defined deliver delving denial details detect detrimental different discussions distributed down draw email emails engineer entered entry even everyone execs experts expose external eye fact feel felt followed following former from full gaining get guises has have having heavily here hiding highlights: his how impact implications indeed industry information informative infosec internal internet interviews iot it’s javvad last leaks learn likely loss make makes malicious malik management many may media methodology misconfigured mistake more most moving nation nearly netted new off often ongoing organization other participants payload payments—as perception perfect perhaps phishing place please plus poor posing pros purposes question quick ransomware rapidly read reality recipient recovery relatively rely report reputational research resource respond respondents responses rest results right risk rsa same scaring second sector security see sense sensitive service shortage showed size skilled social solution sometimes source staff states story strategy surprisingly survey systems technology them things third though threat threats through times today top trust ultimately uncharted unlike unmanaged used usually vocabulary ward website well when which whole without worried worries worry years
Tags Ransomware Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: