Business Is Struggling To Combat Hacking

Businesses are struggling to keep up with the threat posed by cyber criminals, according to a new report.

Published January 19th, the 2016 Cisco Annual Security Report (ASR) has shed light on the issues businesses are currently facing when it comes to cyber security.

This report highlights that, while threats to security and risks such as phishing attacks have remained relatively constant since the first ASR was published in 2007, what is really notable is how quickly cyber criminals innovate to take full advantage of any security gaps in new technology.

Also concerning is that they are also making use of older malware to attack out-of-date systems, which are more vulnerable than up-to-date software. 

In a blog announcing the report's release, senior vice-president, chief security and trust officer at Cisco John Stewart said: "Aging infrastructure opens up green-field attack surfaces while uneven or inconsistent security practices remain a challenge."

He also highlighted that attackers are growing "more bold, flexible, and resilient", while companies are struggling to keep up with global digitisation, notably in terms of detection speeds and staff education.
 
Furthermore, a lack of global coordinate defence against cyber attacks was cited as another weak spot in preventing cyber crime. 

"On the global front, we see fluctuations in cyber internet governance across regions, which inhibits collaboration and the ability to respond to attacks," he explained.

Recently, Wi-Fi hotspots have fallen under scrutiny too. The risks they pose were recently highlighted by the Evening Standard, which reported that such hotspots are increasingly at risk of being hit by criminals - something that businesses and individuals alike can fall prey to.

Mr Stewart suggests that, to tackle risks such as those outlined in the ASR, companies need to act now. In addition to greater global coordination, he suggests senior leaders need to do more to embrace cyber security. Furthermore, vendors who embed IT must also commit themselves to producing secure solutions that customers can trust.

Kroll:http://http://bit.ly/1npke6z

 

« CIO Work Report - Executive Brief (£)
Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

HardTarget

HardTarget

HardTarget is a cutting-edge cyber training company serving HWN (High-Net-Worth) Families and their trusted Advisors.